共 50 条
- [2] Trusted computing based user authentication for mobile equipment [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
- [3] User Authentication using Profiling in Mobile Cloud Computing [J]. AASRI CONFERENCE ON POWER AND ENERGY SYSTEMS, 2012, 2 : 262 - 267
- [4] Waving Gesture Analysis for User Authentication in the Mobile Environment [J]. IEEE NETWORK, 2020, 34 (02): : 57 - 63
- [6] Trusted computing based open environment user authentication model [J]. ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):
- [7] Biometric based User Authentication Protocol for Mobile Cloud Environment [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
- [8] User Authentication Protocol Based on the Location Factor for a Mobile Environment [J]. IEEE ACCESS, 2022, 10 : 16439 - 16455
- [9] Password-based user authentication protocol for mobile environment [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
- [10] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22