Interactive authentication scheme against collusion attack for virtual enterprises

被引:0
|
作者
Zhang, Ya-Ling [1 ]
Zhang, Jing [1 ]
Wang, Xiao-Feng [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an University of Technology, Xi'an 710048, China
关键词
12;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1410 / 1416
相关论文
共 50 条
  • [21] An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
    YIN Fengmei
    PU Guangning
    Wuhan University Journal of Natural Sciences, 2016, 21 (05) : 415 - 420
  • [22] An Attack on Zawadzki's Quantum Authentication Scheme
    Gonzalez-Guillen, Carlos E.
    Gonzalez Vasco, Maria Isabel
    Johnson, Floyd
    Perez del Pozo, Angel L.
    ENTROPY, 2021, 23 (04)
  • [23] Hardening the Virtual Password Authentication Scheme
    Rahiemy, Mohammad Zakie Faiz
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 429 - 434
  • [24] New VCA scheme in virtual enterprises
    Liu, Duan-Yang
    Pan, Xue-Zeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2003, 40 (09):
  • [25] A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs
    Chikhaoui, Ons
    Abassi, Ryma
    Douss, Aida Ben Chehida
    El Fatmi, Sihem Guemara
    INFORMATION SYSTEMS, EMCIS 2019, 2020, 381 : 403 - 416
  • [26] A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks
    Li, Sujun
    Wang, Weiping
    Zhou, Boqing
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 250 - 253
  • [27] An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs
    Zhou, Boqing
    Li, Sujun
    Wang, Weiping
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9738 - 9747
  • [28] = Chosen message attack against Mukherjee-Ganguly-Chaudhuri's message authentication scheme
    Lee, Mun-Kyu
    Hong, Dowon
    Kim, Dong Kyue
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 427 - +
  • [29] Audio CoFIP (contents fingerprinting) robust against collusion attack
    Sonoda, K
    Nishimura, R
    Suzuki, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 1083 - 1089
  • [30] An Advanced Collusion Attack against User Friendship Privacy in OSNs
    Liu, Yuhong
    Li, Na
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 465 - 470