CORC

浏览/检索结果: 共14条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
LUKS认证机制的SoC硬件实现及其优化 学位论文
2016, 2016
李鹏涛
收藏  |  浏览/下载:3/0  |  提交时间:2017/06/20
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 卷号: 11, 期号: 2
作者:  Han, Weili;  Li, Zhigong;  Yuan, Lang;  Xu, Wenyuan
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他
2016-01-01
Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
口令安全研究进展 期刊论文
计算机研究与发展, 2016
王平; 汪定; 黄欣沂
收藏  |  浏览/下载:14/0  |  提交时间:2017/12/03
Targeted Online Password Guessing: An Underestimated Threat 其他
2016-01-01
Wang, Ding; Zhang, Zijian; Wang, Ping; Yan, Jeff; Huang, Xinyi
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
DYNAMIC PASSWORD TOKEN BASED ON SM3 ALGORITHM 会议论文
5th International Conference on Audio, Language and Image Processing (ICALIP), 2016-07-11
作者:  Kong, Deke[1];  Wang, Xuzhi[2];  Zhong, Linxia[3];  Sha, Yangyang[4];  Li, Zhongbin[5]
收藏  |  浏览/下载:6/0  |  提交时间:2019/04/26
Design and Research of Remote Mutual Authentication Protocol Based On Smart Card 会议论文
International Conference on Power Engineering and Energy, Environment (PEEE), Shanghai, PEOPLES R CHINA, JUN 25-26, 2016
作者:  Qi, AQ;  Shen, YJ
收藏  |  浏览/下载:4/0  |  提交时间:2017/05/11
A privacy preserving three-factor authentication protocol for e-Health clouds 期刊论文
JOURNAL OF SUPERCOMPUTING, 2016, 卷号: 72, 期号: 10
作者:  Jiang, Qi;  Khan, Muhammad Khurram;  Lu, Xiang;  Ma, Jianfeng;  He, Debiao
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
A provably-secure and efficient verifier-based anonymous password-authenticated key exchange protocol 期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 670-677
作者:  Yang, Xiaoyan;  Jiang, Han;  Xu, Qiuliang;  Hou, Mengbo;  Wei, Xiaochao
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/16
Phoney: protecting password hashes with threshold cryptology and honeywords 期刊论文
International Journal of Embedded Systems, 2016, 卷号: Vol.8 No.2-3, 页码: 146-154
作者:  Wang, R;  Chen, H;  Sun, JH
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace