Digital Library
Search Results: [ keyword: authentication ] (90)
Chengzhe Lai,
Hui Li,
Yueyu Zhang,
Jin Cao,
Vol. 6, No. 2, February 27, 2012
10.3837/tiis.2012.02.003
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Liang Hu,
Ling Chi,
Hong-tu Li,
Wei Yuan,
Yuyu Sun,
Jian-feng Chu,
Vol. 6, No. 1, January 29, 2012
10.3837/tiis.2012.01.008
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Woo Yong Choi,
Yongwha Chung,
Jin-Won Park,
Dowon Hong,
Vol. 5, No. 11, November 28, 2011
10.3837/tiis.2011.11.020
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
36.
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen,
Ku-Young Chang,
Dowon Hong,
Vol. 5, No. 9, September 28, 2011
10.3837/tiis.2011.09.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
38.
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks
Seung-Hoon Chae,
Sung Jin Lim,
Sang-Hyun Bae,
Yongwha Chung,
Sung Bum Pan,
Vol. 4, No. 6, December 22, 2010
10.3837/tiis.2010.12.018
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Xiangrui Chen,
Gyoung-Bae Kim,
Hae-Young Bae,
Vol. 4, No. 2, April 28, 2010
10.3837/tiis.2010.04.005
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)