共 50 条
- [2] Secure user authentication based on the trusted platform for mobile devices EURASIP Journal on Wireless Communications and Networking, 2016
- [3] A Trusted Third Party Based Secure Authentication Scheme of E-Commerce EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 590 - 594
- [4] Geographical Security Questions for Fallback Authentication 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 217 - 222
- [6] Man-in-the-middle attack on quantum secure communications with authentication Quantum Information Processing, 2014, 13 : 917 - 923
- [7] Secure authentication watermarking for localization against the Holliman–Memon attack Multimedia Systems, 2007, 12 : 521 - 532
- [8] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
- [9] Secure Message Authentication Against Related-Key Attack FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 305 - 324