共 50 条
- [1] Comparative Analysis of VANET Authentication Architecture and Scheme [J]. 2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 89 - 93
- [2] Anonymous authentication scheme for mobile communication [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (01): : 176 - 183
- [3] An anonymous authentication scheme for mobile communication [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
- [4] Software Test Architecture Definition by Analogy with Software Architecture [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2022), 2022, : 244 - 247
- [5] Software architecture operator and its analysis and decomposition [J]. Wuhan Daxue Xuebao (Gongxue Ban)/Engineering Journal of Wuhan University, 2002, 35 (06):
- [6] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. Cluster Computing, 2013, 16 : 861 - 871
- [7] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
- [8] Port Based Software Architecture and Its Analysis [J]. 2016 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2016, : 257 - 264
- [9] A Robust Authentication Scheme for Multiple Servers Architecture [J]. IEEE ACCESS, 2019, 7 : 111222 - 111231
- [10] Enhanced Mutual Authentication Scheme for Cloud Architecture [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 70 - 75