共 50 条
- [31] User authentication scheme for sensor networks 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [32] A scheme for authentication and authorization in a grid application 19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 383 - 387
- [33] A Secure Remote User Authentication Scheme THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
- [34] Cryptanalysis of a remote user authentication scheme ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
- [35] Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
- [37] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
- [38] User authentication scheme based on undeniable signature scheme Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
- [39] Multilevel Authentication Scheme for Cloud Computing INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (09): : 205 - 212
- [40] Authentication Scheme in Cloud Computing: A Review PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,