共 21 条
[1]
A Secure and Practical Authentication Scheme Using Personal Devices
[J].
IEEE ACCESS,
2017, 5
:11677-11687
[2]
Bakar Khaiml Azmi Abu, 2013, COMP INF TECHN WCCIT
[3]
Barber Randal, 2016, ELEGANT HARDWARE MAL
[4]
Mobile Authentication Secure Against Man-In-The-Middle Attacks
[J].
9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS,
2014, 34
:323-329
[5]
Bmni Alessandro, 2016, UB INT COMP ADV TRUS
[6]
Borders Kevin, 2005, SEC STOR WORKSH 2005
[7]
Chen Z., 2008, WIR COMM NETW MOB CO
[8]
A Security and Efficiency Authentication Scheme Based on Human-memorable Password
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2,
2017,
:293-296
[9]
Daniel Hein, 2015, TRUSTCOM BIGDATASE I, V1
[10]
Ichikawa Minor, 2016, ADV INF NETW APPL WO