Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism
暂无分享,去创建一个
[1] Tzong-Chen Wu,et al. Efficient and secure three-party authenticated key exchange protocol for mobile environments , 2013, Journal of Zhejiang University SCIENCE C.
[2] Kevin W. Sowerby,et al. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers , 2014, J. Comput. Syst. Sci..
[3] Qiaoyan Wen,et al. Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things , 2014 .
[4] Chin-Chen Chang,et al. A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users , 2012, Wirel. Pers. Commun..
[5] Yuguang Fang,et al. A secure mobile electronic payment architecture platform for wireless mobile networks , 2008, IEEE Transactions on Wireless Communications.
[6] Wang,et al. MOTP: An Identity Authentication Scheme for M-Commerce , 2013 .
[7] Chih-Ming Hsiao,et al. A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients , 2013, Future Gener. Comput. Syst..
[8] Xuelei Li,et al. Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack , 2014 .
[9] Ashok Kumar Das,et al. An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.
[10] Ching Ying Lin,et al. CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” , 2014 .
[11] Norafida Ithnin,et al. An Optimization of Tree Topology Based Parallel Cryptography , 2012 .
[12] Woei-Jiunn Tsaur,et al. Several security schemes constructed using ECC-based self-certified public key cryptosystems , 2005, Appl. Math. Comput..
[13] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[14] Jenq-Shiou Leu,et al. Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..
[15] Wenjie Liu,et al. Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.
[16] Hyoung-Kee Choi,et al. An Enhanced Security Protocol for VANET-Based Entertainment Services , 2012, IEICE Trans. Commun..
[17] Wenfen Liu,et al. Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture , 2014, Wirel. Pers. Commun..
[18] Jianhua Chen,et al. An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments , 2011, IACR Cryptol. ePrint Arch..
[19] Jen-Ho Yang,et al. An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment , 2013, Inf. Technol. Control..
[20] Morteza Nikooghadam,et al. Secure Transmission of Mobile Agent in Dynamic Distributed Environments , 2013, Wirel. Pers. Commun..
[21] G. Athisha,et al. Reconfigurable Architecture for Elliptic Curve Cryptography Using FPGA , 2013 .
[22] Yacine Ouzrout,et al. The Reputation Evaluation Based on Optimized Hidden Markov Model in E-Commerce , 2013 .
[23] Donghoon Lee,et al. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.
[24] Xiong Li,et al. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme , 2013 .
[25] Chao Zhang,et al. Novel frequency hopping sequences generator based on AES algorithm , 2010 .