Authentication

Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification/Open Call Articles
Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things/Open Call Articles
Delivery of a Certified E-mail Service over the Digital Terrestrial Television Platform/Open Call Articles
DSA with SHA-1 for Space Telecommand Authentication: Analysis and Results/Open Call Articles