共 50 条
- [31] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240
- [32] Security Analysis of Robust User Authentication Protocol PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
- [33] User authentication scheme based on elliptic curve cryptosystem Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
- [34] Message Authentication Scheme Based on Chaotic Quantum Cryptosystem INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
- [37] A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 582 - 587
- [38] A robust approach to detect video-based attacks to enhance security International Journal of Innovative Computing and Applications, 2019, 10 (3-4): : 175 - 184
- [39] Security Analysis of Speech Perceptual Hashing Authentication Algorithm INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
- [40] Measure of security in cryptosystem based on probability analysis Zhongshan Daxue Xuebao, 5 (31-34):