×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [3]
武汉大学 [2]
北京航空航天大学 [1]
软件研究所 [1]
内容类型
期刊论文 [7]
发表日期
2019 [1]
2015 [1]
2014 [1]
2013 [3]
2012 [1]
学科主题
Engineerin... [1]
Mechanics [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Provably secure anonymous three-factor authentication scheme for multi-server environments
期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 卷号: 10, 期号: 2
作者:
Xu, Dongqing
;
Chen, Jianhua
;
Liu, Qin
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/05
Key exchange
Three-factor
Multi-server
ECC
Privileged insider attack
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
期刊论文
2014
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/11
Password authentication
Hierarchical wireless sensor networks
User anonymity
Smart card
Non-tamper resistant
REMOTE USER AUTHENTICATION
CLIENT-SERVER ENVIRONMENT
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
KEY AGREEMENT
ANALYSIS ATTACKS
ACCESS-CONTROL
EFFICIENT
PROTOCOL
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
期刊论文
2013
He, Debiao
;
Wang, Ding
;
Wu, Shuhua
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/16
password-based
smart card
mutual authentication
KEY AGREEMENT PROTOCOL
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2013, 卷号: 70, 期号: 1
作者:
He, Debiao
;
Wu, Shuhua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Multi-server
Smart card
Server spoofing attack
Impersonation attack
Privileged insider attack
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 卷号: 17, 页码: 895-905
作者:
Sun, Da-Zhi
;
Li, Jian-Xin
;
Feng, Zhi-Yong
;
Cao, Zhen-Fu
;
Xu, Guang-Quan
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/01/06
Wireless sensor network
Authentication
Gateway node impersonation attack
Gateway node bypassing attack
Privileged-insider attack
cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
期刊论文
Nonlinear Dynamics, 2012, 卷号: 69, 期号: 3, 页码: 1-9
He Debiao
;
Chen Yitao
;
Chen Jianhua
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/17
Lyapunov methods
©版权所有 ©2017 CSpace - Powered by
CSpace