CORC

浏览/检索结果: 共40条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
T2FA: Transparent Two-Factor Authentication 期刊论文
IEEE ACCESS, 2018, 卷号: Vol.6, 页码: 32677-32686
作者:  Qin, Zheng;  Zhang, Jiliang;  Tan, Xiao;  Wang, Xiangqi;  Yan, Aibin
收藏  |  浏览/下载:18/0  |  提交时间:2019/04/24
Secure and efficient two-factor authentication protocol using RSA signature for multi-server environments 会议论文
作者:  Xu, Zhiqiang;  He, Debiao;  Huang, Xinyi
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2018, 卷号: 27, 期号: 3
作者:  Liu Dong;  Chen Jing;  Du Ruiying;  Zhang Huanguo
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Cryptanalysis and improvement of a two-factor user authentication scheme 期刊论文
2018, 卷号: 10, 期号: 1, 页码: 10
作者:  Kumar, Devender[1];  Chand, Satish[2];  Kumar, Bijendra[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
A provably-secure two-factor authenticated key exchange protocol with stronger anonymity 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 111-124
作者:  Yang, Xiaoyan;  Jiang, Han;  Hou, Mengbo;  Zheng, Zhihua;  Xu, Qiuliang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi 期刊论文
Chinese Journal of Electronics, 2018, 卷号: Vol.27 No.3, 页码: 625-633
作者:  Liu Dong;  Chen Jing;  Du Ruiying;  Zhang Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion 期刊论文
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 卷号: Vol.68, 页码: 107-118
作者:  Wu, Fan;  Li, Xiong;  Xu, Lili;  Kumari, Saru;  Sangaiah, Arun Kumar
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/26
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks 期刊论文
International Journal of Network Management, 2017, 卷号: Vol.27 No.3, 页码: e1937
作者:  Chilamkurti,Naveen;  Shen,Jian;  He,Debiao;  Kumar,Neeraj;  Jiang,Qi
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks 会议论文
作者:  Jiang, Qi;  Kumar, Neeraj;  Ma, Jianfeng;  Shen, Jian;  He, Debiao
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks 期刊论文
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 卷号: 27, 期号: 3
作者:  Jiang, Qi;  Kumar, Neeraj;  Ma, Jianfeng;  Shen, Jian;  He, Debiao
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace