共 50 条
- [1] User perspective and security of a new mobile authentication method [J]. Telecommunication Systems, 2018, 69 : 365 - 379
- [2] A Security Authentication Method of Mobile RFID [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1077 - 1081
- [3] Method of security authentication for mobile agent [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
- [4] A User Security Continuous Authentication Method for Earable Devices [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (11): : 2821 - 2834
- [5] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
- [6] Web based Security with LOPass User Authentication Protocol in Mobile Application [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 250 - 255
- [7] User Authentication Method using Shaking Actions in Mobile Devices [J]. 2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 142 - 147
- [8] Peer-to-peer security in mobile devices: A user perspective [J]. FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 252 - 257
- [9] User Authentication for Mobile Devices [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
- [10] A new user authentication protocol for mobile terminals in wireless network [J]. Proc. IEEE Int. Conf. Mobile Data Manage., (94-98):