共 50 条
- [1] Nonrepudiation Protocols in Cloud Systems [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT 2016), 2016,
- [2] An enhanced authentication protocol for personal communication systems [J]. 1998 IEEE WORKSHOP ON APPLICATION-SPECIFIC SOFTWARE ENGINEERING AND TECHNOLOGY (ASSET 98) - PROCEEDINGS, 1998, : 128 - 132
- [3] Verification of authentication protocols for mobile satellite communication systems [J]. EGYPTIAN JOURNAL OF REMOTE SENSING AND SPACE SCIENCES, 2014, 17 (02): : 171 - 177
- [4] TECHNIQUES FOR PRIVACY AND AUTHENTICATION IN PERSONAL COMMUNICATION-SYSTEMS [J]. IEEE PERSONAL COMMUNICATIONS, 1995, 2 (04): : 6 - 10
- [6] Analysis of a non repudiation authentication protocol for Personal Communication Systems [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 289 - 293
- [7] Two-phase Nonrepudiation Protocols [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT 2016), 2016,
- [8] Nonrepudiation Protocols Without a Trusted Party [J]. Networked Systems, NETYS 2016, 2016, 9944 : 1 - 15
- [9] AN AUTHENTICATION PROTOCOL WITH BILLING NON-REPUDIATION TO PERSONAL COMMUNICATION SYSTEMS [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2657 - 2664
- [10] PERSONAL COMMUNICATION SERVICES [J]. ELECTRONICS INFORMATION & PLANNING, 1994, 21 (08): : 470 - 478