共 50 条
- [21] A Comprehensive Study on Multifactor Authentication Schemes ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 561 - +
- [22] The role of arbiters in asymmetric authentication schemes INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 428 - 441
- [24] Content Authentication Schemes for Digital Images 2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 224 - 229
- [25] Password authentication schemes on a quantum computer 2021 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE 2021) / QUANTUM WEEK 2021, 2021, : 346 - 350
- [26] Post-Quantum Authentication Schemes PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 3812 - 3825
- [27] Mutual Authentication in Electronic Voting Schemes 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 380 - 381
- [29] Authentication codes based on association schemes IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (01): : 126 - 130
- [30] Authentication Schemes for Wireless Sensor Networks 2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 367 - 372