共 50 条
- [32] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
- [33] A secure RFID authentication scheme for medicine applications [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 175 - 181
- [34] A secure authentication scheme based on fuzzy extractor [J]. Computer Modelling and New Technologies, 2014, 18 (12): : 46 - 55
- [35] Secure and Efficient Authentication Scheme in IoT Environments [J]. APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
- [36] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES [J]. PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
- [37] Secure authentication scheme for IoT and cloud servers [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
- [38] Efficient and secure message authentication scheme for VANET [J]. Wu, Li-Bing (wu@whu.edu.cn), 1600, Editorial Board of Journal on Communications (37):
- [39] Secure Multicast Authentication Scheme using DTLS [J]. 2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 133 - 137
- [40] A Secure Mutual Authentication Scheme for Wireless Communication [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 114 - 130