共 50 条
- [41] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
- [42] Anonymous RFID Authentication Using Trusted Computing Technologies RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
- [44] User Authentication for Mobile Devices COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
- [45] A Property-Based Mobile Platform Trusted Authentication Scheme for Wireless Networks 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1157 - 1161
- [46] A COHERENT AUTHENTICATION FRAMEWORK FOR MOBILE COMPUTING BASED ON HOMOMORPHIC SIGNATURE AND IMPLICIT AUTHENTICATION PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 426 - 434
- [48] An ID-Based User Authentication Scheme for Cloud Computing 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
- [50] Anonymous authentication scheme of trusted mobile terminal under mobile Internet Zhang, D.-D. (zhdd0411@163.com), 1600, Beijing University of Posts and Telecommunications (20):