共 50 条
- [1] Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 429 - 438
- [2] Kerberos Based Authentication Protocol With Improved Identity Protection in 3G Network PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 771 - 774
- [3] A Network Authentication Protocol Based on Kerberos INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
- [4] Improved Authentication Model Based on Kerberos Protocol ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
- [5] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network EURASIP Journal on Wireless Communications and Networking, 2016
- [7] A Wireless Mesh Network Authentication Method based on Identity Based Signature 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
- [8] An Improved User Authentication Scheme for Wireless Mesh Networks 2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 915 - 918
- [9] A New Wireless Mesh Network Authentication Scheme Based on Threshold Method PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2260 - 2265
- [10] Scalable Authentication Protocol for Wireless Mesh Network Access 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3051 - 3054