共 50 条
- [21] A short proxy signature scheme: Efficient authentication in the ubiquitous world EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 480 - 489
- [22] Re-engineering of Web Reverse Proxy with Shibboleth Authentication 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 325 - 330
- [23] AUTHENTICATION IN MULTI-TIER SYSTEMS USING PROXY SIGNATURES PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2010, 10 (04): : 18 - +
- [24] Performace Analysis of authentication method for Proxy Mobile IP protocol PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2048 - 2051
- [25] An Authentication Client Proxy Mechanism for Resource-Constrained Devices 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
- [26] Lightweight mutual authentication based on proxy certificate trust list PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 628 - 632
- [27] A proxy service for the xrootd data server SCIENTIFIC APPLICATIONS OF GRID COMPUTING, 2004, 3458 : 38 - 49
- [28] CUIAS - A User Identity Authentication Service for Discovery Service 2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 95 - 101
- [29] A service bundle authentication mechanism in the OSGi service platform 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 420 - 425