Interactive authentication scheme against collusion attack for virtual enterprises

被引:0
|
作者
Zhang, Ya-Ling [1 ]
Zhang, Jing [1 ]
Wang, Xiao-Feng [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an University of Technology, Xi'an 710048, China
关键词
12;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1410 / 1416
相关论文
共 50 条
  • [1] Novel conspiracy attack immune generalized interactive authentication scheme for virtual enterprises with traceability
    Zhang, Wen-Fang
    Wang, Xiao-Min
    He, Da-Ke
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2010, 16 (07): : 1558 - 1567
  • [2] Nonlinear collusion attack on a watermarking scheme for buyer authentication
    Wu, Yongdong
    IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (03) : 626 - 629
  • [3] A Spoofing Attack against a Cancelable Biometric Authentication Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    Torii, Naoya
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
  • [4] A Collusion Attack on the Fuzzy Vault Scheme
    Poon, Hoi Ting
    Miri, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (01): : 27 - 34
  • [5] Continuous Authentication against Collusion Attacks
    Lyu, Pin
    Cai, Wandong
    Wang, Yao
    SENSORS, 2022, 22 (13)
  • [6] Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 305 - 319
  • [7] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [8] Research on User Authentication Scheme against the Man-in-the-Middle Attack
    Zhou, Xiancun
    Xiong, Yan
    Liu, Renjin
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
  • [9] A new password authentication scheme resistant against shoulder surfing attack
    Al-Husainy, Mohammed Abbas Fadhil
    Uliyan, Diaa Mohammed
    Journal of Technology, 2019, 34 (01): : 25 - 35
  • [10] A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack
    Hyla, Tomasz
    Pejas, Jerzy
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM 2017), 2017, 10244 : 638 - 651