设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(99)
知网期刊论文(31)
在“
Elsevier电子期刊
”中,
命中:
6
条,耗时:0.0149942 秒
在所有数据库中总计命中:
130
条
1.
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
作者:
Vanga Odelu
a
;
b
;
odelu.vanga@gmail.com
;
odelu.vanga@iiits.in
Author Vitae
;
Ashok Kumar Das
c
;
iitkgp.akdas@gmail.com
Author Vitae
;
Saru Kumari
d
;
saryusiirohi@gmail.com
Author Vitae
;
Xinyi Huang
e
;
f
;
xyhuang81@gmail.com
Author Vitae
;
Mohammad Wazid
c
;
mohammad.wazid@research.iiit.ac.in
;
wazidkec2005@gmail.com
Author Vitae
关键词:
Cloud computing
;
SK-security
;
Mutual authentication
;
User
untraceability
;
AVISPA
;
NS2 simulation
刊名:Future Generation Computer Systems
出版年:2017
2.
Efficient handover authentication with
user
anonymity and
untraceability
for Mobile Cloud Computing
作者:
Xu Yang
a
;
b
Author Vitae
;
Xinyi Huang
a
;
b
;
xyhuang81@gmail.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Joseph K. Liu
c
Author Vitae
关键词:
Mobile Cloud Computing
;
Handover authentication
;
Security
;
Efficiency
;
User
anonymity
;
Untraceability
刊名:Future Generation Computer Systems
出版年:2016
3.
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
作者:
Qi Jiang
a
;
jiangqixdu@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Jianfeng Ma
a
;
Fushan Wei
a
;
Youliang Tian
b
;
youliangtian@163.com" class="auth_mail" title="E-mail the corresponding author
;
Jian Shen
c
;
s_shenjian@126.com" class="auth_mail" title="E-mail the corresponding author
;
Yuanyuan Yang
d
;
yangyy@mctc.org.cn" class="auth_mail" title="E-mail the corresponding author
关键词:
Wireless sensor network
;
Authentication
;
Key agreement
;
Privacy
;
Untraceability
;
Elliptic curve cryptography
;
Smart card
刊名:Journal of Network and Computer Applications
出版年:2016
4.
PrivaKERB: A
user
privacy framework for Kerberos
作者:
F.
;
Pereniguez
a
;
;
pereniguez@um.es
;
R.
;
Marin-Lopez
a
;
;
rafa@um.es
;
G.
;
Kambourakis
b
;
;
gkamb@aegean.gr
;
S.
;
Gritzalis
b
;
;
sgritz@aegean.gr
;
A.F.
;
Gomez
a
;
;
skarmeta@um.es
[Author vitae]
关键词:
Identity
;
Kerberos
;
Network Federation
;
Privacy
;
Security
刊名:Computers and Security
出版年:2011
5.
A provably secure secret handshake with dynamic controlled matching
作者:
Aless
;
ro Sorniotti
;
Refik Molva
关键词:
Applied cryptography
;
Secret handshakes
;
Untraceability
;
Unlinkability
;
Provable Security
刊名:Computers and Security
出版年:2010
6.
Authentication protocol providing
user
anonymity and
untraceability
in wireless mobile communication systems
作者:
Park
;
Chang-Seop
关键词:
Authentication
;
Wireless
;
Anonymity
;
Error-correcting codes
刊名:Computer Networks
出版年:2004
1
按检索点细分(6)
题名(2)
关键词(2)
文摘(3)
按出版年细分(6)
2017年(1)
2016年(2)
2011年(1)
2010年(1)
2004年(1)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.