Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network
暂无分享,去创建一个
[1] Bei Gong,et al. Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing , 2019, Wuhan University Journal of Natural Sciences.
[2] Liehuang Zhu,et al. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.
[3] A. R. Meijer. Deception in authentication channels with multiple usage , 1994, Proceedings of COMSIG '94 - 1994 South African Symposium on Communications and Signal Processing.
[4] Srinivasan Seshan,et al. A network architecture for heterogeneous mobile computing , 1998, IEEE Wirel. Commun..
[5] Dijiang Huang,et al. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.
[6] E. O. Kiktenko,et al. Detecting brute-force attacks on cryptocurrency wallets , 2019, BIS.
[7] Jian Wang,et al. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics , 2018, Sensors.
[8] R Mamatha,et al. A Review of Cancelable Biometric Authentication Methods , 2018 .
[9] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[10] Binxing Fang,et al. Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism , 2019, The Journal of Supercomputing.