共 50 条
[21]
Provably secure certificateless trusted access protocol for WLAN without pairing
[J].
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
2014, 51 (02)
:325-333
[22]
An Algorithm for Testing Isomorphism of Planer Graph Based on Distant Matrix
[J].
EMERGING MATERIALS AND MECHANICS APPLICATIONS,
2012, 487
:317-321
[23]
A Secure Scalable Authentication Protocol for Access Network Communications using ECC
[J].
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS),
2021,
[25]
On the Security of an ECC Based RFID Authentication Protocol
[J].
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC),
2012,
:111-114
[26]
Authentication protocol based on elliptic curve cryptography
[J].
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES,
2010, 37 (02)
:83-91
[27]
A Novel RFID Authentication Protocol Based on NTRU
[J].
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4,
2013, 411-414
:16-20
[29]
Openstack authentication protocol based on digital certificate
[J].
Tongxin Xuebao/Journal on Communications,
2019, 40 (02)
:188-196
[30]
Authenticating Grid Using Graph Isomorphism Based Zero Knowledge Proof
[J].
ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I,
2014, 248
:11-19