共 50 条
- [2] Trusted mutual authentication scheme with smart cards and passwords Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (01): : 128 - 133
- [4] APPLICABILITY OF SMART CARDS TO NETWORK USER AUTHENTICATION COMPUTING SYSTEMS, 1994, 7 (01): : 75 - 89
- [5] Microprocessor smart cards with fingerprint user authentication 36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 46 - 49
- [7] Trusted computing based user authentication for mobile equipment Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
- [9] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [10] Trusted computing based open environment user authentication model ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):