您当前的位置:
首页 >
文章列表页 >
Security flaws and improvement to a wireless authentication protocol with anonymity
更新时间:2024-10-14
    • Security flaws and improvement to a wireless authentication protocol with anonymity

    • Issue 9, Pages: 78-85(2006)
    • CLC: TP393.08
    • Published:2006

    移动端阅览

  • PENG Hua-xi, FENG Deng-guo. Security flaws and improvement to a wireless authentication protocol with anonymity[J]. 2006, (9): 78-85. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1051

下载量

15

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Identity privacy and security protection scheme for charitable donations based on group signatures
AEUR: authenticated encryption algorithm design based on uBlock round function
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Survey on data security and privacy-preserving for the research of edge computing

Related Author

FENG Huamin
YUAN Xiqin
WANG Zhizhong
LIU Biao
Hui DONG
Yatao YANG
Jiantao LIU
Yanshuo ZHANG

Related Institution

Key Laboratory of Information Security, Beijing Electronics Science and Technology Institute
School of Telecommunication Engineering, Xidian University
Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute
Information Engineering University
College of Computer Science and Technology, National University of Defense Technology
0