Authentication
Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification
2019| Vol. 15 (3) | Open Call Articles| Pages: 254-261| PDF (952 KiB) | 2019-08-29 |7 views| 1 CrossRef citationCost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
2014| Vol. 10 (3) | Open Call Articles| Pages: 179-187| PDF (1.42 MiB) | 2017-03-16 |6 views| 1 CrossRef citationDSA with SHA-1 for Space Telecommand Authentication: Analysis and Results
2009| Vol. 5 (1) | Open Call Articles| Pages: 26-32| PDF (4.79 MiB) | 2009-03-22 |8 views| 0 CrossRef citationsDelivery of a Certified E-mail Service over the Digital Terrestrial Television Platform
2008| Vol. 4 (2) | Open Call Articles| Pages: 113-121| PDF (1.30 MiB) | 2008-06-22 |9 views| 0 CrossRef citations