Subject
Management of Technology and Innovation,Artificial Intelligence,Computer Science Applications,Hardware and Architecture,Engineering (miscellaneous),Information Systems,Computer Science (miscellaneous),Software
Reference21 articles.
1. RFC2104: HMAC: Keyed-Hashing for Message Authentication;Krawczyk,1997
2. One-time password authentication scheme to solve stolen verifier problem;Isawa,2011
3. Formal verification of secure evidence collection protocol using BAN logic and AVISPA;Yogesh;Procedia Comput. Sci.,2020
4. Secure authentication scheme for IoT and cloud servers;Kalra;Pervasive Mob. Comput.,2015
5. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol;Liao;Ad Hoc Netw.,2014