CORC

浏览/检索结果: 共15条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 11041-11066
作者:  Amin, Ruhul;  Islam, S. K. Hafizul;  Vijayakumar, Pandi;  Khan, Muhammad Khurram;  Chang, Victor
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/26
An Improved Authentication and Key Agreement scheme for Session Initial Protocol 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 卷号: 11, 期号: 8
作者:  Wu, Libing;  Fan, Jing;  Xie, Yong;  Wang, Jing
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks 期刊论文
Computer Networks, 2017, 卷号: Vol.129, 页码: 429-443
作者:  Li, Xiong;  Ibrahim, Maged Hamada;  Kumari, Saru;  Sangaiah, Arun Kumar;  Gupta, Vidushi
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
A privacy-preserving group authentication protocol for machine-type communication in lte/lte-a networks 期刊论文
Security and communication networks, 2016, 卷号: 9, 期号: 13, 页码: 2002-2014
作者:  Fu, Anmin;  Song, Jianye;  Li, Shuai;  Zhang, Gongxuan;  Zhang, Yuqing
收藏  |  浏览/下载:36/0  |  提交时间:2019/05/09
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity 期刊论文
2016
作者:  Zhou, Yousheng[1,2];  Zhou, Junfeng[1];  Wang, Feng[3];  Guo, Feng[4]
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/30
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography 期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 期号: 14
作者:  He, Debiao;  Wang, Huaqun;  Khan, Muhammad Khurram;  Wang, Lina
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity 期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding; Wang, Nan; Wang, Ping; Qing, Sihan
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions 期刊论文
computer networks, 2014
Wang, Ding; Wang, Ping
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/10
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks 期刊论文
2014
Wang, Ding; Wang, Ping
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/11
Cryptanalysis and improvement of an authentication scheme for telecare medical information systems 期刊论文
International Journal of Electronic Security and Digital Forensics, 2014, 卷号: Vol.6 No.3, 页码: 157 - 168
作者:  ChunmingZhang;  YunZhao
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace