您当前的位置:
首页 >
文章列表页 >
Identity-based cross-domain authentication scheme in pervasive computing environments
更新时间:2024-10-14
    • Identity-based cross-domain authentication scheme in pervasive computing environments

    • Vol. 32, Issue 9, Pages: 111-115(2011)
    • CLC: TN918.1
    • Published:2011

    移动端阅览

  • LUO Chang-yuan, HUO Shi-wei, XING Hong-zhi. Identity-based cross-domain authentication scheme in pervasive computing environments[J]. 2011, 32(9): 111-115. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1111

下载量

9

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Anonymous authentication scheme based on one-off public key in pervasive computing environments
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Research on data integration privacy preservation mechanism for DaaS
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Context-aware and self-adaptive trust model for pervasive computing

Related Author

Shi-wei HUO
Hong-zhi XING
Chang-yuan LUO
LI Guang-song1
MA Jian-feng1
JIANG Qi1
LIU Hong-yue1
Zhi-gang ZHOU

Related Institution

Electronic Technology Institute,Information Engineering University
Xi'an Communications Institute
Key Laboratory of Computer Networks and Information Security
信息工程大学信息研究系
Research Center of Computer Network and Information Security Technology,Harbin Institute of Technology
0