设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(77)
CNKI会议论文(4)
CNKI学位论文(8339)
CNKI期刊论文0611(3)
知网期刊论文(3589)
在“
SpringerLink电子期刊
”中,
命中:
1,837
条,耗时:0.0120291 秒
在所有数据库中总计命中:
12,012
条
1.
Efficient anonymous
authentication
with key agreement
protocol
for wireless medical sensor networks
作者:
Omid Mir
;
Jorge Munilla
;
Saru Kumari
关键词:
Wireless medical sensor network
;
Authentication
protocol
;
Anonymous
;
Smart card
;
Random oracle
刊名:Peer-to-Peer Networking and Applications
出版年:2017
2.
An anonymous and secure
authentication
and key agreement scheme for session initiation
protocol
作者:
Hao Lin
;
Fengtong Wen
;
Chunxia Du
关键词:
Authentication
;
Session Initiation
Protocol
(SIP)
;
Security attacks
;
User anonymity
;
The elliptic curve discrete logarithm problem
刊名:Multimedia Tools and Applications
出版年:2017
3.
Concealing
Ketje
: A Lightweight PUF-Based Privacy Preserving
Authentication
Protocol
关键词:
Privacy
;
preserving
authentication
protocol
;
Physically Unclonable Function
;
Authenticated Encryption
;
SoC
;
FPGA
刊名:Lecture Notes in Computer Science
出版年:2017
4.
Anonymous handover
authentication
protocol
for mobile wireless networks with conditional privacy preservation
作者:
Debiao He
;
Ding Wang
;
Qi Xie
;
Kefei Chen
关键词:
mobile wireless network
;
handover
authentication
;
anonymity
;
conditional privacy preservation
;
provable security
刊名:SCIENCE CHINA Information Sciences
出版年:2017
5.
An improved and provably secure privacy preserving
authentication
protocol
for SIP
作者:
Shehzad Ashraf Chaudhry
;
Husnain Naqvi…
关键词:
Authentication
;
Authenticated key agreement
;
Elliptic curve cryptography
;
Impersonation attack
;
Provable security
;
ProVerif
刊名:Peer-to-Peer Networking and Applications
出版年:2017
6.
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos
Authentication
Protocol
关键词:
Biometrics
;
Remote
authentication
;
Kerberos
;
Fuzzy extractor
;
Cancelable transformation
;
Mutual
authentication
刊名:Lecture Notes in Computer Science
出版年:2017
7.
An improved smart card based
authentication
scheme for session initiation
protocol
作者:
Saru Kumari
;
Shehzad Ashraf Chaudhry
;
Fan Wu…
关键词:
Authentication
;
Security
;
Anonymity and privacy
;
Impersonation attack
;
Provable security
;
ProVerif
刊名:Peer-to-Peer Networking and Applications
出版年:2017
8.
Privacy preservation and protection for cluster based geographic routing
protocol
in MANET
作者:
B. Muthusenthil
;
S. Murugavalli
关键词:
MANET
;
Cluster
;
Geographic routing
protocol
;
Authentication
;
Encryption
刊名:Wireless Networks
出版年:2017
9.
An improved and anonymous two-factor
authentication
protocol
for health-care applications with wireless medical sensor networks
作者:
Fan Wu
;
Lili Xu
;
Saru Kumari
;
Xiong Li
关键词:
Wireless medical sensor network
;
Smart card
;
The off
;
line guessing attack
;
The sensor capture attack
;
Mutual
authentication
刊名:Multimedia Systems
出版年:2017
10.
Cryptanalysis and Extended Three-Factor Remote User
Authentication
Scheme in Multi-Server Environment
作者:
Preeti Chandrakar
;
Hari Om
关键词:
Authentication
;
AVISPA
;
BAN Logic
;
Cryptanalysis
;
Three
;
factor
刊名:Arabian Journal for Science and Engineering
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(1837)
题名(371)
关键词(207)
文摘(1625)
按出版年细分(1837)
2017年(26)
2016年(149)
2015年(148)
2014年(166)
2013年(164)
2012年(140)
2011年(29)
2010年(77)
2009年(86)
2008年(103)
2007年(192)
2006年(239)
2005年(209)
2004年(51)
2003年(18)
2002年(25)
2001年(8)
2000年(4)
2000年及以前(3)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.