×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [5]
北京航空航天大学 [3]
武汉大学 [2]
西安交通大学 [1]
华中师范大学 [1]
上海电子信息职业技术... [1]
更多...
内容类型
期刊论文 [8]
会议论文 [3]
其他 [3]
发表日期
2015 [14]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
限定条件
发表日期:2015
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Survey on Eye Movement Based Authentication Systems
会议论文
作者:
Zhang, Yun
;
Mou, Xuanqin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Human computer interaction
Graphical password
Access control
Eye tracking
Authentication
Saccades
Fixations
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015
Wang, Ding
;
He, Debiao
;
Wang, Ping
;
Chu, Chao-Hsien
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
user anonymity
offline dictionary attack
de-synchronization attack
smart card loss attack
SMART-CARDS
PASSWORD AUTHENTICATION
SECURITY ANALYSIS
USER ANONYMITY
SCHEME
ATTACKS
KEY
EFFICIENT
NETWORKS
PROTOCOLS
On the Usability of Two-Factor Authentication
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Two-factor authentication
Usability
User anonymity
SMART-CARD
PASSWORD AUTHENTICATION
SCHEME
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Offline dictionary attack
Smart card
Common memory device
Non-tamper resistant
USER AUTHENTICATION
KEY EXCHANGE
SECURITY ENHANCEMENT
EFFICIENT
ROBUST
IMPROVEMENTS
PROTOCOL
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
User authentication
Password creation policy
Password cracking
Online trawling guessing
Online targeted guessing
SECURITY
WEBSITES
Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
会议论文
2015 International Conference on Materials Engineering and Information Technology Applications(MEITA 2015), 中国广西桂林, 2015-08-30
作者:
Li Jiping*
;
Ding Yaoming
;
Xiong Zenggang
;
Liu Shouyin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
authentication
smart card
password
wireless sensor network
Efficient provably secure password-based explicit authenticated key agreement
期刊论文
PERVASIVE AND MOBILE COMPUTING, 2015, 卷号: 24
作者:
Ruan, Ou
;
Kumar, Neeraj
;
He, Debiao
;
Lee, Jong-Hyouk
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Key agreement
Explicit authenticated key agreement
Password-based authentication
Provable security
Impersonation attack
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2015, 卷号: 85, 期号: 1
作者:
Huang, Baojun
;
Khan, Muhammad Khurram
;
Wu, Libing
;
Bin Muhaya, Fahad T.
;
He, Debiao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Password Smart card
Remote authentication
Key agreement
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
期刊论文
International Journal of Communication Systems, 2015, 卷号: Vol.28 No.2, 页码: 374-382
作者:
Li, Xiong
;
Niu, Jianwei
;
Liao, Junguo
;
Liang, Wei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/31
authentication
cryptanalysis
dynamic identity
password
privacy
©版权所有 ©2017 CSpace - Powered by
CSpace