Group Authentication
暂无分享,去创建一个
[1] Azween Abdullah,et al. EAP-Based Authentication for Ad Hoc Network , 2007 .
[2] Lein Harn,et al. Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications , 2011, IEEE Transactions on Wireless Communications.
[3] Sandeep S. Kulkarni,et al. Balancing Revocation and Storage Trade-Offs in Secure Group Communication , 2011, IEEE Transactions on Dependable and Secure Computing.
[4] Rolf Oppliger,et al. SSL/TLS Session-Aware User Authentication , 2008, Computer.
[5] Candelaria Hernández-Goya,et al. Self-organized authentication in mobile ad-hoc networks , 2009, Journal of Communications and Networks.
[6] I. Downnard. Public-key cryptography extensions into Kerberos , 2003 .
[7] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[8] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Jong Wook Hong,et al. Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService , 2010, IEEE Transactions on Mobile Computing.
[13] Nirwan Ansari,et al. Survey of security services on group communications , 2010, IET Inf. Secur..
[14] Wei-Chi Ku. Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture , 2005, IEEE Transactions on Neural Networks.
[15] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[16] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.