共 50 条
- [41] Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE) 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1446 - 1451
- [42] On the security of the authentication module of Chinese WLAN standard implementation plan APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 340 - 348
- [43] A directed graph-based authentication protocol model and its security analysis FCST 2006: JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2006, : 89 - +
- [46] An efficient identity authentication protocol for layer 2 security sourced on ECC for IoT communications Test Engineering and Management, 2019, 81 (11-12): : 1799 - 1810
- [47] A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 229 - 234
- [48] A Security Enhancement and Proof for Authentication and Key Agreement (AKA) SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 235 - 252
- [50] Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security Journal of Cryptology, 2005, 18 : 133 - 165