共 50 条
- [21] Provably secure certificateless trusted access protocol for WLAN without pairing Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (02): : 325 - 333
- [22] An Algorithm for Testing Isomorphism of Planer Graph Based on Distant Matrix EMERGING MATERIALS AND MECHANICS APPLICATIONS, 2012, 487 : 317 - 321
- [23] A Secure Scalable Authentication Protocol for Access Network Communications using ECC 2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
- [25] Openstack authentication protocol based on digital certificate Tongxin Xuebao/Journal on Communications, 2019, 40 (02): : 188 - 196
- [27] A Novel RFID Authentication Protocol Based on NTRU INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 16 - 20
- [28] On the Security of an ECC Based RFID Authentication Protocol 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
- [29] Authentication protocol based on elliptic curve cryptography ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
- [30] Authenticating Grid Using Graph Isomorphism Based Zero Knowledge Proof ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 11 - 19