搜索authentication共有 52 个结果
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。
1
Research on cross-domain identity authentication of unmanned aerial vehicle network based on blockchain
Accepted Paper
2024年第7期 :
doi:10.19734/j.issn.1001-3695.2023.11.0532
2
Identity-based multiparty authenticated key agreement protocol for smart homes from lattice
2024年第4期 : 1191-1197
doi:10.19734/j.issn.1001-3695.2023.06.0341
3
RFID tripartite authentication protocol based on Chebyshev chaos mapping and PUF
2024年第2期 : 582-586,595
doi:10.19734/j.issn.1001-3695.2023.06.0263
4
Security authentication protocol for Internet of Vehicles based on blockchain
2023年第10期 : 2908-2915,2921
doi:10.19734/j.issn.1001-3695.2023.02.0077
5
Tamarin-based security analysis of MQTT protocol
2023年第10期 : 3132-3137,3143
doi:10.19734/j.issn.1001-3695.2023.02.0038
6
Batch zero-knowledge identity authentication scheme based on attribute access strategy
2023年第8期 : 2487-2492
doi:10.19734/j.issn.1001-3695.2022.12.0801
7
Lightweight hierarchical authentication scheme for MEC in V2G network
2023年第7期 : 2162-2169,2178
doi:10.19734/j.issn.1001-3695.2022.11.0641
8
Conditional privacy-preserving authentication scheme based on fog computing and multi TA in VANET
2023年第6期 : 1845-1849
doi:10.19734/j.issn.1001-3695.2022.10.0537
9
Certificateless cryption based public key keyword searchable encryption scheme with denial authentication
2023年第5期 : 1510-1514
doi:10.19734/j.issn.1001-3695.2022.09.0474
10
Design of mobile RFID high-efficiency authentication protocol
2023年第2期 : 595-600
doi:10.19734/j.issn.1001-3695.2022.04.0264
11
Forgery detection and authentication for face image using frequency domain watermarking
2022年第12期 : 3776-3780
doi:10.19734/j.issn.1001-3695.2022.05.0205
12
Handover authentication method and key agreement protocol between gNB based on CRT
2022年第11期 : 3450-3454,3460
doi:10.19734/j.issn.1001-3695.2022.03.0158
13
Research on spatial network authentication strategy based on CFL
2022年第11期 : 3455-3460
doi:10.19734/j.issn.1001-3695.2022.04.0177
14
Controllable identity management and authentication model for ECC-ZKP-based agricultural products supply chain
2022年第10期 : 2916-2922,2928
doi:10.19734/j.issn.1001-3695.2022.04.0144
15
Security enhanced lightweight anonymous authentication scheme for smart grid
2022年第10期 : 3124-3129,3135
doi:10.19734/j.issn.1001-3695.2022.03.0118
16
Efficient certificateless authentication scheme for LEO satellite networks
2022年第10期 : 3151-3155
doi:10.19734/j.issn.1001-3695.2022.02.0102
17
Telemedicine information system authentication scheme based on extended chaotic graph
2022年第7期 : 2137-2142
doi:10.19734/j.issn.1001-3695.2021.11.0660
18
Self-sovereign identity authentication scheme based on blockchain and cryptographic accumulator
2022年第6期 : 1633-1637,1644
doi:10.19734/j.issn.1001-3695.2021.11.0591
19
Towards discovering compromised hosts with temporal-spatial behaviors in advanced persistent threats
2022年第6期 : 1860-1864
doi:10.19734/j.issn.1001-3695.2021.11.0598
20
Signature and authentication method based on message hash chain
2022年第4期 : 1183-1189
doi:10.19734/j.issn.1001-3695.2021.08.0381
21
Biometric authentication key exchange protocol from lattice on Cybertwin network
2022年第4期 : 1195-1201
doi:10.19734/j.issn.1001-3695.2021.09.0415
22
Two-party attribute-based session key agreement protocol with expressive authentication policies
2022年第4期 : 1213-1217,1223
doi:10.19734/j.issn.1001-3695.2021.06.0365
23
Threshold identity authentication scheme based on biometrics
2022年第4期 : 1224-1227
doi:10.19734/j.issn.1001-3695.2021.08.0388
24
Authentication and access control scheme for smart home based on blockchain
2022年第3期 : 863-867,873
doi:10.19734/j.issn.1001-3695.2021.08.0321
25
Research on high-efficiency lossless color image authentication encryption algorithm
2022年第2期 : 582-586
doi:10.19734/j.issn.1001-3695.2021.06.0271
26
Blockchain-based privacy-preserving certificateless authentication scheme for Internet of Vehicles
2021年第10期 : 2919-2925
doi:10.19734/j.issn.1001-3695.2021.02.0062
27
Security password authentication scheme based on smart card from lattices
2021年第9期 : 2831-2836
doi:10.19734/j.issn.1001-3695.2020.11.0555
28
Cross domain authentication scheme based on multi layer blockchain
2021年第6期 : 1637-1641
doi:10.19734/j.issn.1001-3695.2020.09.0215
29
Research on CFL-based blockchain system authentication mechanism
2021年第2期 : 347-355
doi:10.19734/j.issn.1001-3695.2019.12.0655
30
Provable security certificateless authentication scheme with batch verification for vehicular Ad hoc network
2021年第2期 : 572-578
doi:10.19734/j.issn.1001-3695.2019.12.0682
31
IoT anonymous transaction scheme based on alliance chain
2021年第1期 : 23-27
doi:10.19734/j.issn.1001-3695.2019.09.0620
32
Research on unified trust anchor model based on ZooKeeper
2020年第12期 : 3722-3725
doi:10.19734/j.issn.1001-3695.2019.08.0568
33
Outsourcing encryption and decryption CP-ABE scheme with revocation
2020年第11期 : 3373-3377
doi:10.19734/j.issn.1001-3695.2019.06.0295
34
Cross-domain control scheme based on hybrid cryptosystem in cloud environment
2020年第11期 : 3387-3391
doi:10.19734/j.issn.1001-3695.2019.06.0298
35
Identity authentication scheme var improved dual-hop wireless body area network
2020年第11期 : 3417-3421
doi:10.19734/j.issn.1001-3695.2019.06.0297
36
Research on security-enhanced three-factor multi-server authentication scheme with anonymity
2020年第9期 : 2781-2788
doi:10.19734/j.issn.1001-3695.2019.03.0034
37
Mobile payment scheme based on certificateless encrypted short message verification code
2020年第7期 : 2132-2135
doi:10.19734/j.issn.1001-3695.2019.01.0018
38
Lightweight RFID mutual authentication protocol with anti-synchronization attack
2020年第4期 : 1136-1139
doi:10.19734/j.issn.1001-3695.2018.09.0756
39
Quantum key distribution protocol with two-way authentication
2020年第4期 : 1154-1157
doi:10.19734/j.issn.1001-3695.2018.09.0750
40
Research on encryption of location hierarchical attributes supporting revocation
2020年第1期 : 216-220
doi:10.19734/j.issn.1001-3695.2018.06.0477
41
Research of three factor remote authentication protocol based on bilinear mapping
2020年第1期 : 221-224
doi:10.19734/j.issn.1001-3695.2018.06.0476
42
Policy-hidden attribute-based encryption scheme with traceable keys
2019年第11期 : 3382-3386
doi:10.19734/j.issn.1001-3695.2018.05.0316
43
MACSec security association scheme for trusted computing environment
2019年第10期 : 3043-3047,3062
doi:10.19734/j.issn.1001-3695.2018.04.0856
44
Research on methods of improving efficiency of identity authentication based on blockchain
2019年第9期 : 2783-2787,2791
doi:10.19734/j.issn.1001-3695.2018.03.0211
45
Research on node authentication scheme in wireless body area networks
2019年第8期 : 2436-2439
doi:10.19734/j.issn.1001-3695.2018.03.0172
46
Mutual authentication and key negotiation protocol for removable storage devices applicable to multi-level environment
2019年第4期 : 1115-1119
doi:10.19734/j.issn.1001-3695.2017.11.1003
47
Quantum identity authentication protocol based on Bell states and entanglement swapping
2019年第4期 : 1125-1127,1152
doi:10.19734/j.issn.1001-3695.2017.11.1000
48
One access authentication architecture and method for software defined space-ground integration network
2019年第3期 : 873-877
doi:10.19734/j.issn.1001-3695.2017.09.0944
49
Design and realization of SDN trusted connection
2019年第3期 : 911-917
doi:10.19734/j.issn.1001-3695.2017.09.0937
50
Bayesian network method for remote sensing cloud user behavior authentication
2019年第2期 : 441-445
doi:10.19734/j.issn.1001-3695.2017.09.0903
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。