Showing 1 - 20 results of 29 for search '"Authentication protocol"', query time: 0.05s Refine Results
  1. 1

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article
  2. 2

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol;game theory;protocol security…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    Subjects: “…wireless sensor networks;multicast authentication protocol;PKC;Co-DH group pair…”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  17. 17

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol;Chinese remainder theorem;aggregate signature, NB-IoT…”
    Get full text
    Article
  18. 18
  19. 19

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    Subjects: “…self-certified public key;protocol composition logic;protocol derivation system;authentication protocol;4G…”
    Get full text
    Article
  20. 20