共 50 条
- [1] Novel conspiracy attack immune generalized interactive authentication scheme for virtual enterprises with traceability Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2010, 16 (07): : 1558 - 1567
- [3] A Spoofing Attack against a Cancelable Biometric Authentication Scheme 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
- [4] A Collusion Attack on the Fuzzy Vault Scheme ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (01): : 27 - 34
- [7] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
- [8] Research on User Authentication Scheme against the Man-in-the-Middle Attack INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
- [9] A new password authentication scheme resistant against shoulder surfing attack Journal of Technology, 2019, 34 (01): : 25 - 35
- [10] A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM 2017), 2017, 10244 : 638 - 651