共 50 条
[11]
Authentication and ID-Based Key Management Protocol in Pervasive Environment
[J].
Wireless Personal Communications,
2010, 55
:91-103
[13]
Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
[J].
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS,
2003,
:349-350
[14]
A Dynamic ID-based authentication scheme with smart token
[J].
2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009),
2009,
:294-+
[17]
A secret key based authentication scheme using smart cards
[J].
SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT,
2005,
:65-71
[18]
Efficient ID-based authenticated key agreement
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3,
2008,
:681-684
[19]
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
[J].
SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015),
2015, 536
:110-121