CORC

浏览/检索结果: 共19条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao; Wang, Ding; Xie, Qi; Chen, Kefei
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文
Science China. Information Science, 2017
He Debiao; Wang Ding; Xie Qi; Chen Kefei
收藏  |  浏览/下载:12/0  |  提交时间:2017/12/03
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他
2016-01-01
Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Location Semantics Protection Based on Bayesian Inference 其他
2015-01-01
Wu, Zhengang; Chen, Zhong; Zhu, Jiawei; Sun, Huiping; Guan, Zhi
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
连续空间查询的位置隐私保护综述 期刊论文
计算机应用研究, 2015
吴振刚; 孙惠平; 关志; 陈钟
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/12
Conditional anonymity with non-probabilistic adversary 期刊论文
INFORMATION SCIENCES, 2015
Chen, Weien; Cao, Yongzhi; Wang, Hanpin
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity 期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding; Wang, Nan; Wang, Ping; Qing, Sihan
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015
Wang, Ding; He, Debiao; Wang, Ping; Chu, Chao-Hsien
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
On the Usability of Two-Factor Authentication 其他
2015-01-01
Wang, Ding; Wang, Ping
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions 期刊论文
computer networks, 2014
Wang, Ding; Wang, Ping
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/10


©版权所有 ©2017 CSpace - Powered by CSpace