共 50 条
- [3] A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT [J]. International Journal of Wireless Information Networks, 2020, 27 : 234 - 240
- [5] Lite-IDE based Hirearchical Node Authentication Protocol for Energy Efficient in WSN [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 644 - 647
- [7] Trusted Computing Based Mobile DRM Authentication Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [8] Trusted Network Access Authentication Scheme Based on the Label [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 123 - 130
- [9] Study on Access Control Based on Trusted Computing [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
- [10] Mutual Entity Authentication Protocol Based on ECDSA for WSN [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 187 - 192