共 50 条
- [33] Verifying authentication protocols with CSP 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17
- [34] A Survey of User Authentication Based on Channel State Information WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
- [35] Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 253 - 259
- [37] Construction of a secure two-factor user authentication system using fingerprint information and password Journal of Intelligent Manufacturing, 2014, 25 : 217 - 230
- [39] An Efficient Two Factor User Authentication and Key Exchange Protocol for Telecare Medical Information System INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2020, 15 (04): : 1015 - 1027
- [40] LAN BRIDGES MAKE NETWORK COMMUNICATIONS TRANSPARENT TO THE USER. Computer Technology Review, 1986, 6 (02):