您当前的位置:
首页 >
文章列表页 >
Trusted and anonymous authentication scheme for wireless networks
更新时间:2024-10-14
    • Trusted and anonymous authentication scheme for wireless networks

    • Vol. 30, Issue 9, Pages: 29-35(2009)
    • CLC: TN918.82
    • Published:2009

    移动端阅览

  • YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2. Trusted and anonymous authentication scheme for wireless networks[J]. 2009, 30(9): 29-35. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

963

下载量

8

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Improved direct anonymous attestation scheme for mobile computing platforms
Design and validation for a remote attestation security protocol
Direct anonymous authentication scheme for wireless networks under trusted computing
Rational-security and fair two-party comparison protocol
Overview of research on trusted attestation technology of cloud virtualization platform

Related Author

Zhi-hong LIU
Li YANG
Jun-wei ZHANG
Jian-feng MA
ZHOU Xiao-dong
WEI Jin-feng
WANG Dan
YANG Li1

Related Institution

School of Computer Science &Technology,Xidian University
College of Computer Science, Beijing University of Technology
School of Computer Science,Xidian University
Xidian University State Key Laboratory of Integrated Service Networks
School of Computing and Information Systems, Singapore Management University
0