共 50 条
- [41] A new authentication and key exchange protocol in WLAN [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 552 - 556
- [42] Weaknesses in EHA authentication and key distribution protocol [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95
- [43] On the security of an enhanced authentication key exchange protocol [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
- [44] A dynamic key authentication protocol for RFID system [J]. Mu, Haibing (hbmu@bjtu.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07): : 3 - 4
- [45] Key Management and Authentication Protocol for UAV Network [J]. Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2019, 51 (03): : 158 - 166
- [46] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments [J]. PLOS ONE, 2020, 15 (04):
- [48] Authentication Key Exchange Protocol for IMS Network [J]. 2010 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2010,
- [49] Key generation schemes for channel authentication in quantum key distribution protocol [J]. IET QUANTUM COMMUNICATION, 2021, 2 (03): : 90 - 97
- [50] Authentication and key distribution methods in mobile computing environments [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 353 - 356