共 59 条
[11]
A criteria-based evaluation framework for authentication schemes in IMS
[J].
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2,
2009,
:865-+
[12]
FInjan, 2017, WHAT IS NONR PRINC T
[13]
Forget A, 2015, INF COMPUT SECUR
[14]
Gatto J., WHAT ARE RISKS ASS I
[15]
Geetha N., 2016, Graph theory matrix approach in selecting optimal combination of operating parameter
[18]
What do we mean by entity authentication?
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:46-54
[20]
An approach to develop the smart health using Internet of Things and authentication based on biometric technology
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 91
:434-449