An Individual and Group Authentication Model for Wireless Network Services
暂无分享,去创建一个
Bala Srinivasan | Huy Hoang Ngo | Xianping Wu | Phu Dung Le | B. Srinivasan | Xianping Wu | P. D. Le
[1] Leonardo A. Martucci,et al. A Lightweight Distributed Group Authentication Mechanism , 2004 .
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Qiang Tang,et al. Cryptanalysis of a hybrid authentication protocol for large mobile networks , 2006, J. Syst. Softw..
[5] Hung-Yu Chien,et al. A hybrid authentication protocol for large mobile network , 2003, J. Syst. Softw..
[6] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[7] Eric S. Raymond,et al. The Art of Unix Programming , 2003 .
[8] Huy Hoang Ngo,et al. Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..
[9] Pearl Brereton,et al. Service-based software: the future for flexible software , 2000, Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000.
[10] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[11] Yiling Wang,et al. Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[12] Paul F. Syverson,et al. The Logic of Authentication Protocols , 2000, FOSAD.
[13] Huy Hoang Ngo,et al. Package-Role Based Authorization Control Model for Wireless Network Services , 2009, 2009 International Conference on Availability, Reliability and Security.
[14] Seung-Hun Jin,et al. The Security Limitations of SSO in OpenID , 2008, 2008 10th International Conference on Advanced Communication Technology.
[15] Z. Kotulski,et al. A new protocol for group authentication providing partial anonymity , 2005, Next Generation Internet Networks, 2005.
[16] Michele Bugliesi,et al. Principles for Entity Authentication , 2003, Ershov Memorial Conference.
[17] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.