共 50 条
- [32] Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms 2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017), 2017, : 252 - 259
- [33] Cyber Physical Security Protection in Online Authentication Mechanisms for Banking Systems INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1021 - 1031
- [34] Implementation of the security system for instant messengers COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 739 - 744
- [36] Security analysis of two lightweight RFID authentication protocols annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
- [37] A RFID Mutual Authentication Security Protocol Design and Analysis 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
- [38] Security analysis of authentication scheme with anonymity for wireless environments 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
- [39] Security Analysis of Speech Perceptual Hashing Authentication Algorithm INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
- [40] Design and Security Analysis of Mobile Identity Authentication Protocol MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649