已选(0)清除
条数/页: 排序方式:
|
| Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文 SCIENCE CHINA-INFORMATION SCIENCES, 2017 He, Debiao; Wang, Ding; Xie, Qi; Chen, Kefei 收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
|
| Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文 Science China. Information Science, 2017 He Debiao; Wang Ding; Xie Qi; Chen Kefei 收藏  |  浏览/下载:12/0  |  提交时间:2017/12/03
|
| The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他 2016-01-01 Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| Location Semantics Protection Based on Bayesian Inference 其他 2015-01-01 Wu, Zhengang; Chen, Zhong; Zhu, Jiawei; Sun, Huiping; Guan, Zhi 收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
|
| 连续空间查询的位置隐私保护综述 期刊论文 计算机应用研究, 2015 吴振刚; 孙惠平; 关志; 陈钟 收藏  |  浏览/下载:6/0  |  提交时间:2015/11/12
|
| Conditional anonymity with non-probabilistic adversary 期刊论文 INFORMATION SCIENCES, 2015 Chen, Weien; Cao, Yongzhi; Wang, Hanpin 收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
|
| Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity 期刊论文 INFORMATION SCIENCES, 2015 Wang, Ding; Wang, Nan; Wang, Ping; Qing, Sihan 收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
|
| Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment 期刊论文 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015 Wang, Ding; He, Debiao; Wang, Ping; Chu, Chao-Hsien 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| On the Usability of Two-Factor Authentication 其他 2015-01-01 Wang, Ding; Wang, Ping 收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
|
| On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions 期刊论文 computer networks, 2014 Wang, Ding; Wang, Ping 收藏  |  浏览/下载:6/0  |  提交时间:2015/11/10
|