共 50 条
- [31] On the design of a secure user authentication and key agreement scheme for wireless sensor networks CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
- [32] Design of secure key management and user authentication scheme for fog computing services FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
- [35] Efficient and secure source authentication scheme for multicast user authentication Journal of Central South University, 2013, 20 : 2741 - 2746
- [36] A more Multifactor Secure Authentication Scheme based on graphical authentication 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
- [38] A DCT-robust multimedia authentication scheme ANZIIS 2001: PROCEEDINGS OF THE SEVENTH AUSTRALIAN AND NEW ZEALAND INTELLIGENT INFORMATION SYSTEMS CONFERENCE, 2001, : 59 - 62
- [39] Robust buyer authentication scheme for multimedia object 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 97 - 100
- [40] Content Authentication Scheme for Modifiable Multimedia Streams MULTIMEDIA, COMPUTER GRAPHICS AND BROADCASTING, PT I, 2011, 262 : 377 - 386