您当前的位置:
首页 >
文章列表页 >
ID-based wireless authentication scheme with anonymity
更新时间:2024-10-14
    • ID-based wireless authentication scheme with anonymity

    • Vol. 30, Issue 4, Pages: 130-136(2009)
    • CLC: TP393.08
    • Published:2009

    移动端阅览

  • ZHU Hui, LI Hui, SHU Wan-li, et al. ID-based wireless authentication scheme with anonymity[J]. 2009, 30(4): 130-136. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1096

下载量

12

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

LQG control-aware resource scheduling method for IEEE 802.11ax networks
Concrete constructions of 2-resilient rotation symmetric Boolean functions with 7 variables
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Intelligent transmit power control algorithm for the multi-user interference of wireless network
Constructions of rotation symmetric 2-resilient functions with 4t-1 number of variables

Related Author

Meng ZHENG
Lei ZHANG
Wei LIANG
Jiao DU
Lin LI
Ziwei ZHAO
Yueyue LI
Tianyin WANG

Related Institution

Key Laboratory of Networked Control Systems, Chinese Academy of Sciences
Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences
School of Computer Science and Technology, University of Chinese Academy of Sciences
State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences
College of Mathematics and Information Science,Henan Normal University
0