共 50 条
- [31] A Collaborative PHY-Aided Technique For End-to-End IoT Device Authentication [J]. IEEE ACCESS, 2018, 6 : 42279 - 42293
- [32] Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 284 - +
- [33] A decentralized scalable security framework for end-to-end authentication of future IoT communication [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12):
- [34] AuthLoop: Practical End-to-End Cryptographic Authentication for Telephony over Voice Channels [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 963 - 978
- [35] A new end-to-end authentication protocol for mobile users to access internet services [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 239 - 250
- [36] An End-to-End e-Election System Based on Multimodal Identification and Authentication [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2010, : 10 - 17
- [37] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
- [40] End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 123 - 138