Choosing Authentication Techniques in E-procurement System in Serbia
暂无分享,去创建一个
[1] M. Caloyannides,et al. US e-government authentication framework and programs , 2003 .
[2] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[3] Yoshiaki Isobe,et al. Development of personal authentication system using fingerprint with digital signature technologies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[4] Charles W. Beardsley. Is your computer insecure? , 1972, IEEE Spectrum.
[5] Hua-Qing Zhou,et al. PKI-Based E-Business Security System , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[6] Arthur Tatnall. Web Portals: The New Gateways to Internet Information and Services , 2004 .
[7] H. Bing,et al. Secure authentication system incorporating hand shapes verification and cryptography techniques , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[8] Yoichi Seto. Development of personal authentication systems using fingerprint with smart cards and digital signature technologies , 2002, 7th International Conference on Control, Automation, Robotics and Vision, 2002. ICARCV 2002..
[9] Craig Larman,et al. Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process , 2001 .
[10] Lei Shen,et al. A User Authentication Scheme Based on Fingerprint and USIM Card , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[11] Jiann-Der Lee,et al. International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .
[12] Lynette I. Millett,et al. Authentication and Its Privacy Effects , 2003, IEEE Internet Comput..