Authentication相关论文
An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular
As an indispensable part of the Intelli-gent Transportation System (ITS),the vehicular ad-hoc network (VANET) has attrac......
In order to meet people\'s demand for various types of network services,researchers have conducted extensive research ......
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two......
...
cooperative work manner for a group of people making use of network.Nowadays,it is a study hotspot in and out country,but ......
Trusted access to the Internet of Things sensing layer node is the precondition for the trusted operation of the Interne......
A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root i......
Taking biological features and ID as identification,combining biological features Authentication and Signcryption Strate......
Rapid Identification and Quantification of Adulterated Pearl Powder by Tri-step Infrared Spectroscop
The micro morphology and chemical composition of shell powder are similar to those of pearl powder,and unfortunately pea......
Application of Ant Colony Algorithm in Fingerprint Identification System Based on Internet of Things
The Internet of things is a network which connected to objects through the Internet,internet was treated as the foundati......
In recent decades, intelligent transportation systems (ITS) have improved drivers\' safety and have shared information......
One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The ......
由于越来越多的人们使用多媒体社交网络来共享多媒体信息或从多媒体社交网络中获取多媒体信息.因此,多服务器认证在多媒体社交网络......
Mouse cell lines have been used extensively as in vitro models for biomedical research.The scientific community has deve......
This paper proposes a novel construction of efficient certificateless aggregate signature (CLAS) scheme.On basis of ......
In this letter,we propose a new secure and efficient certificateless aggregate signature scheme which has the advant......
基于身份管理和服务的相结合对网络中的统一身份管理服务进行分析。通过介绍组成身份管理模型的关键定义,提出统一身份服务模型图,......
随着智能电网建设的推进,ISO 7498-2、PPDR等现有安全模型不能很好地指导智能电网体系进行安全防护建设。提出一种新的适用于电网......
Since network services are provided cooperatively by multiple servers in the Internet,the authentication protocols for m......
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subseq......
As a popular real-time service on the Internet,Voice over Internet Protocol(VoIP)communication attracts more and more at......
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control tec......
Distance vector routing protocols have been widely adopted as an efcient routing mechanism in current Internet,and many ......
In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a constructi......
An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilitie......
The Electronic Text Centre of the OpenUniversity of Hong Kong(OUHK)has been in full operationsince early 2001.It curren......
The study was designed to explore the potential applications of the real-time cell electronic analysis technology in the......
Authentication is the basis of the security of IEEE 802.11i standard.The authentication process in 802.11i involves two ......
Recent development of the peer-to-peer(P2P)live streaming technique has brought unprecedented new momentum to the Intern......
Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public ......
Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN:Review and Analys
An analysis of WLAN security mechanisms of wired equivalent privacy(WEP) and Wi-Fi protected access(WPA) discovers that ......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
Design of guided mode resonant filters for authentication applications through azimuthal angles vary
Guided mode resonant filters(GMRFs)for authentication application with low sideband reflection at 0°and 90°azimuthal a......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
Smart Card PrimerA smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a s......
在近几年的翻译实践中遇到了不少企业简介的翻译,很多企业都在简介中写了“已通过ISO9000质量体系认证”等类似的句子。因为翻译的......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
With the broad implementations of the electronic business and government applications,robust system security and strong ......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
WhatnewtrendintheinformationtechnologyfieldWillhavethemostlong-termimpactonbusiness?MyOwncandidateisoneword:trust.It’sn......
自开放因特网商业使用以来,网上的电子商业交易急剧增长,但是有关交易付款及数据保护,一直是许多集团及信息业所努力解决的问题。......
Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor
Identity-based cryptography (IBC) has drawn a lot of attentions in delay tolerant environment. However, the high computa......
...
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technol
Modem information technology has been utilized progressively to store and distribute a large amount of healthcare data t......