共 50 条
- [21] A Survey of RFID Authentication Protocols Based on Hash-Chain Method THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
- [23] Biometric based authentication and access control techniques to secure Mobile Cloud Computing 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
- [24] Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3131 - 3144
- [26] Electrocardiogram signals-based user authentication systems using soft computing techniques Artificial Intelligence Review, 2021, 54 : 667 - 709
- [27] Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1972 - 1983