共 50 条
- [31] A Location Authentication Scheme Based On Adjacent Users PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 158 - 162
- [32] A location authentication scheme based on adjacent users PIC 2014 - Proceedings of 2014 IEEE International Conference on Progress in Informatics and Computing, 2014, : 158 - 162
- [33] Evolutionary Prediction of Information Propagation Dynamics Based on Time Series Characteristics PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 133 - 137
- [34] Hybrid method for prediction of users' information behavior in the Internet based on bioinspired search INTERNATIONAL CONFERENCE: INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY, 2019, 1333
- [35] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems Journal of Medical Systems, 2014, 38
- [37] An Authentication Key Establish Protocol for WSNs Based on Combined Key Wireless Personal Communications, 2018, 99 : 95 - 110
- [40] Secure Authentication from a Weak Key, without Leaking Information ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265