共 50 条
- [41] Secure RFID Authentication with Efficient Key-Lookup [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4777 - +
- [43] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J]. Journal of Medical Systems, 2013, 37
- [44] From weak to strong information-theoretic key agreement [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 18 - 18
- [47] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211
- [48] A Secure Chameleon Hash Function without Key Exposure from Pairings [J]. 2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 15 - 18
- [49] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
- [50] Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7334 - 7344