IEEE.org IEEE Xplore Digital Library IEEE Standards Association IEEE Spectrum Online More IEEE Sites
IEEE.org More IEEE Sites
13 resources related to

Impersonation Attacks

Read more

Featured Article

Read more

Related topics

No topics related to "Impersonation Attacks"

Xplore Articles related to Impersonation Attacks

An Improved Secure Authentication and Key Agreement Scheme for Healthcare Applications
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios
Continuous Authentication Based on Keystroke and Mouse Dynamics in Video Private Network
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks
A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
An Efficient Lightweight Anonymous Authentication Scheme for V2G Using Physical Unclonable Function
Smart vehicle monitoring for detecting anomalies on CAN bus
CAPTCHA-Based Secret-Key Sharing Using Quantum Communication
A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid
More links

Most published Xplore authors for Impersonation Attacks

Tang Shang
Li Yong Gui
More links
Home Topic List Contact FAQ Call to Action Accessibility Nondiscrimination Policy IEEE Privacy Policy
© Copyright 2025 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.