共 131 条
[21]
Kambourakis G(2015)Orientation range of transposition for vertical correlation suppression of 2dpalmphasor code Multimed Tools Appl 74 11,683-1415
[22]
Lambrinoudakis C(2017)Simplified 2DPalmHash code for secure palmprint verification Multimed Tools Appl 76 8373-380
[23]
Gritzalis S(2017)A fast and efficient hash function based on generalized chaotic mapping with variable parameters Neural Comput Appl 28 1405-115
[24]
Ehlert S(2010)A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves Comput Commun 33 372-9
[25]
Sisalem D(2016)From action to activity: Sensor-based activity recognition Neurocomputing 181 108-459
[26]
Irshad A(2015)Robust and efficient authentication scheme for session initiation protocol Math Probl Eng 2015 1-9886
[27]
Sher M(2016)A secure and efficient mutual authentication scheme for session initiation protocol Peer-to-Peer Netw Appl 9 449-192
[28]
Faisal MS(2017)Cost-effective river water quality management using integrated real-time control technology Environ Sci Technol 51 9876-1391
[29]
Ghani A(2016)A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card Peer-to-peer Netw Appl 9 171-910
[30]
Ul Hassan M(2016)A secure and robust smartcard-based authentication scheme for session initiation protocol using elliptic curve cryptography Wirel Pers Commun 91 1361-1556