共 50 条
- [2] Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
- [4] An Efficient ACO Scheme for Mobile-Sink Based WSN 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 575 - 579
- [5] A Spoofing Attack against a Cancelable Biometric Authentication Scheme 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
- [7] A secure and efficient authentication scheme for mobile users Int. J. Mobile Commun., 2006, 5 (581-594):
- [8] A SECURE LOCALIZATION ALGORITHM BASED ON REPUTATION AGAINST WORMHOLE ATTACK IN UWSNS 2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 695 - 700
- [9] Interactive authentication scheme against collusion attack for virtual enterprises Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (07): : 1410 - 1416
- [10] Security and Efficient Authentication Scheme for Mobile Edge Computing Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (01): : 110 - 116