Articles by keywords "authentication"
ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE
- Year: 2022
- Issue: 2
- 1
- 541
- Pages: 30-34
On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2
- Year: 2025
- Issue: 4
- 28
- 829
- Pages: 89-101
Authentication of electronic vehicle control units based on hidden channels
- Year: 2025
- Issue: 4
- 16
- 670
- Pages: 59-75
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
- Year: 2021
- Issue: 2
- 3
- 706
- Pages: 82-88
Authentication and key establishment in WSN based on key pre-distribution
- Year: 2021
- Issue: 4
- 1
- 655
- Pages: 61-71
Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography
- Year: 2023
- Issue: 1
- 2
- 779
- Pages: 26-36
Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework
- Year: 2025
- Issue: 2
- 22
- 909
- Pages: 71-85