Analysis of software communication architecture and its test authentication scheme

被引:0
|
作者
Li, Yue [1 ]
Chen, Wei-Wei [2 ]
Xia, Pan-Yuan [3 ]
Yang, Feng [3 ]
机构
[1] Naval Armament Research Institute, Beijing,100161, China
[2] China Electronic System Engineering Company, Beijing,100141, China
[3] Shanghai Jiao Tong University, Shanghai,200240, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:225 / 230
相关论文
共 50 条
  • [1] Comparative Analysis of VANET Authentication Architecture and Scheme
    Zhang, Yu
    Bai, Xiangyu
    [J]. 2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 89 - 93
  • [2] Anonymous authentication scheme for mobile communication
    Liu J.
    Gu L.
    Luo S.
    Yang Y.
    Cui J.
    Wu X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (01): : 176 - 183
  • [3] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [4] Software Test Architecture Definition by Analogy with Software Architecture
    Masuda, Satoshi
    Hagar, Jon
    Nishi, Yasuharu
    Suzuki, Kazuhiro
    [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2022), 2022, : 244 - 247
  • [5] Software architecture operator and its analysis and decomposition
    Liu, Haiqing
    Li, Hui
    Zheng, Peng
    [J]. Wuhan Daxue Xuebao (Gongxue Ban)/Engineering Journal of Wuhan University, 2002, 35 (06):
  • [6] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    [J]. Cluster Computing, 2013, 16 : 861 - 871
  • [7] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [8] Port Based Software Architecture and Its Analysis
    Huang, Hongyun
    Ding, Zuohua
    [J]. 2016 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2016, : 257 - 264
  • [9] A Robust Authentication Scheme for Multiple Servers Architecture
    Wang, Huawei
    Guo, Dianli
    Wen, Qiaoyan
    Zhang, Hua
    [J]. IEEE ACCESS, 2019, 7 : 111222 - 111231
  • [10] Enhanced Mutual Authentication Scheme for Cloud Architecture
    Jaidhar, C. D.
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 70 - 75