Articles by keywords "authentication"

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 1
  • 541
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 28
  • 829
  • Pages: 89-101

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 16
  • 670
  • Pages: 59-75

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 706
  • Pages: 82-88

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 1
  • 655
  • Pages: 61-71

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 6
  • 799
  • Pages: 44-56

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 779
  • Pages: 26-36

Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 22
  • 909
  • Pages: 71-85