共 50 条
- [1] Anonymous RFID Authentication Using Trusted Computing Technologies [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
- [2] Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 409 - +
- [3] Towards Practical Anonymous Password Authentication [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 59 - 68
- [4] Anonymous authentication scheme of trusted mobile terminal under mobile Internet [J]. Zhang, D.-D. (zhdd0411@163.com), 1600, Beijing University of Posts and Telecommunications (20):
- [7] Towards Lightweight Anonymous Entity Authentication for IoT Applications [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 265 - 280
- [10] Enhanced bio-trusted anonymous authentication routing technique of wireless body area network [J]. BIOMEDICAL RESEARCH-INDIA, 2016, 27 : S276 - S282