共 50 条
- [1] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
- [2] Secure End-To-End Authentication for Mobile Banking [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
- [3] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
- [4] An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 319 - 324
- [6] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. Cluster Computing, 2013, 16 : 861 - 871
- [7] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
- [9] Efficient end-to-end authentication protocols for mobile networks [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
- [10] An end-to-end authentication protocol in wireless application protocol [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259