共 50 条
- [31] Deniable authentication protocol based on elliptic curve cryptography [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
- [32] A Design of Elliptic Curve Cryptography-based Authentication using QR Code [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619
- [34] A Novel Authentication Scheme for Mobile Environments in the Context of Elliptic Curve Cryptography [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
- [35] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography [J]. Journal of Medical Systems, 2016, 40
- [36] The Study of Password Authentication System Based on Elliptic Curve Cryptosystem [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6309 - 6312
- [38] A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems [J]. IEEE ACCESS, 2018, 6 : 7452 - 7463
- [39] Mixed symmetric key and elliptic curve encryption scheme used for password authentication and update under unstable network environment [J]. J. Inf. Hiding Multimedia Signal Proces., 3 (632-639):
- [40] Mixed symmetric key and elliptic curve encryption scheme used for password authentication and update under unstable network environment [J]. Li, Haifeng (lihaifeng8848@mail.dlut.edu.cn), 1600, Ubiquitous International (08):