共 50 条
- [1] Identity authentication scheme in trusted network [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 27 - 29
- [2] The Design of Trusted Access Scheme Based On Identity For WiMAX Network [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 429 - 433
- [3] A new information measurement scheme based on TPM for trusted network access [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 506 - +
- [4] Access Authentication Mechanism for Trusted Network Implement on Mobile Terminals [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (05): : 425 - 428
- [6] Trusted Access in Wireless Network on Mutual Interactive Authentication Mechanism [J]. PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 776 - 781
- [7] Trusted Computing Based Mobile DRM Authentication Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [10] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234