您当前的位置:
首页 >
文章列表页 >
Direct anonymous authentication scheme for wireless networks under trusted computing
更新时间:2024-10-14
    • Direct anonymous authentication scheme for wireless networks under trusted computing

    • Vol. 31, Issue 8, Pages: 98-104(2010)
    • CLC: TN918.82
    • Published:2010

    移动端阅览

  • YANG Li1, MA Jian-feng 1, PEI Qing-qi2, et al. Direct anonymous authentication scheme for wireless networks under trusted computing[J]. 2010, 31(8): 98-104. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1007

下载量

5

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Improved direct anonymous attestation scheme for mobile computing platforms
Trusted and anonymous authentication scheme for wireless networks
Design and validation for a remote attestation security protocol
Rational-security and fair two-party comparison protocol
Overview of research on trusted attestation technology of cloud virtualization platform

Related Author

Li YANG
Jun-wei ZHANG
Jian-feng MA
Zhi-hong LIU
YANG Li1
MA Jian-feng 1
ZHU Jian-ming 2
WANG Dan

Related Institution

School of Computer Science &Technology,Xidian University
School of Information, Central University of Finance Economics
College of Computer Science, Beijing University of Technology
Xidian University State Key Laboratory of Integrated Service Networks
Guangzhou Institute of Technology, Xidian University
0