共 50 条
[12]
RFID security authentication protocol based on key update mechanism
[J].
INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3,
2014, 46
:1395-1401
[13]
Security authentication based on generated address algorithm for software-defined optical communication network
[J].
2019 18TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN),
2019,
[14]
A Network Authentication Protocol Based on Kerberos
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2009, 9 (08)
:17-26
[15]
A New Password Authentication Based On The Dual Model Of Apollonian Network Model
[J].
PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020),
2020,
:226-230
[16]
On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps
[J].
2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP),
2015,
:143-146
[17]
AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS
[J].
INFORMATION TECHNOLOGY AND CONTROL,
2009, 38 (01)
:61-66