共 50 条
- [1] Cross authentication model based on threshold method INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 495 - 498
- [2] A New Wireless Mesh Network Authentication Scheme Based on Threshold Method PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2260 - 2265
- [3] The Authentication Method In Wireless Sensor Network Based On Trust Model 2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), 2017, : 993 - 997
- [4] A Wireless Mesh Network Authentication Method based on Identity Based Signature 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
- [5] An improved authentication method towards wireless mesh m-commerce network Journal of Information and Computational Science, 2010, 7 (01): : 177 - 183
- [6] An Authentication Model for Wireless Network Services 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 996 - 1003
- [7] A Multi-element Authentication Method Based on ECDSA for Wireless Network 2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 47 - 49
- [8] An insider user authentication method based on improved temporal convolutional network HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
- [9] A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014), 2014, : 190 - 194
- [10] A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 182 - +