共 50 条
- [41] A Survey on Attacks in Remote User Authentication Scheme [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1157 - 1160
- [42] A Continuous User Authentication Scheme for Mobile Devices [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
- [43] A user authentication scheme with identity and location privacy [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 235 - 246
- [44] A remote authentication scheme preserving user anonymity [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
- [45] An Improved User-Participating Authentication Scheme [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 115 - 124
- [46] Cryptanalysis and improvement of a remote user authentication scheme [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
- [47] Efficient User and Broadcast Authentication Scheme for WSNs [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 3052 - 3057