A new design of wearable token system for mobile device security
暂无分享,去创建一个
Jizhou Sun | Da-Zhi Sun | Zhiyong Feng | Jin-Peng Huai | Jiawan Zhang | Ji-zhou Sun | Zhiyong Feng | Da-Zhi Sun | Jin-Peng Huai | Jiawan Zhang
[1] Brian D. Noble,et al. Mobile Device Security Using Transient Authentication , 2006, IEEE Transactions on Mobile Computing.
[2] Jizhou Sun,et al. An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks , 2007, IEEE Transactions on Consumer Electronics.
[3] Da-Zhi Sun,et al. Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme , 2005, Appl. Math. Comput..
[4] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[5] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[6] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[7] Da-Zhi Sun,et al. Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme , 2005, Appl. Math. Comput..
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Brian D. Noble,et al. Protecting File Systems with Transient Authentication , 2005, Wirel. Networks.
[12] Da-Zhi Sun,et al. Improved public key authentication scheme for non-repudiation , 2005, Appl. Math. Comput..
[13] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[14] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[15] Mandayam T. Raghunath,et al. Application design for a smart watch with a high resolution display , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.
[16] Da-Zhi Sun,et al. Remarks on a new key authentication scheme based on discrete logarithms , 2005, Appl. Math. Comput..