Journal of Jilin University(Engineering and Technology Edition) ›› 2018, Vol. 48 ›› Issue (5): 1586-1592.doi: 10.13229/j.cnki.jdxbgxb20171258
Previous Articles Next Articles
YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng
CLC Number:
[1] Jiang Q,Ma J,Li G,et al.An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks[J].Wireless Personal Communications,2013,68(4):1477-1491. [2] Lamport L.Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772. [3] Chandrakar P, Om H.A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC[J]. Computer Communications, 2017,110:26-34. [4] Irshad A, Sher M, Ahmad H F, et al.An improved multi-server authentication scheme for distributed mobile cloud computing services[J]. TIIS, 2016, 10(12): 5529-5552. [5] Chatterjee K, De A.A novel multi-server authentication scheme for e-commerce applications using smart card[J]. Wireless Personal Communications, 2016, 91(1): 293-312. [6] Yeh K H.A provably secure multi-server based authentication scheme[J]. Wireless Personal Communications, 2014, 79(3): 1621-1634. [7] Tan Z.A secure privacy-preserving remote user authentication scheme using smart cards for multi-server environment[J].International Journal on Information,2012,15(4):1547-1558. [8] Kim H, Jeon W, Lee K, et al.Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme[C]∥ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications. Berlin:Springer,2012:391-406. [9] Wang B,Ma M.A smart card based efficient and secured multi-server authentication scheme[J].Wireless Personal Communications,2013,68(2):361-378. [10] Yang D, Yang B.A biometric password-based multi-server authentication scheme with smart card[C]∥International Conference on Computer Design and Applications, IEEE, 2010:554-559. [11] Mishra D, Das A K, Mukhopadhyay S.A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards[J]. Expert Systems with Applications, 2014, 41(18): 8129-8143. [12] Sood S K, Sarje A K, Singh K.A secure dynamic identity based authentication protocol for multi-server architecture[J]. Journal of Network and Computer Applications, 2011, 34(2): 609-618. [13] Li X, Xiong Y, Ma J, et al.An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012, 35(2): 763-769. [14] Chuang M C, Chen M C.An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics[J]. Expert Systems with Applications, 2014, 41(4): 1411-1418. [15] Guo H, Wang P, Zhang X, et al.A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments[J]. PloS One, 2017, 12(11): e0187403. [16] He D, Gao Y, Chan S, et al.An enhanced two-factor user authentication scheme in wireless sensor networks[J]. Ad Hoc & Sensor Wireless Networks, 2010,10(4):361-371. |
[1] | YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929. |
[2] | ZHAO Bo, QIN Gui-he. High robustness image watermarking algorithm [J]. 吉林大学学报(工学版), 2017, 47(1): 249-254. |
[3] | HAO Ping-ting, HU Liang, JIANG Jing-yan, CHE Xi-long. Optimistic lock protocol of multi-managed nodes [J]. 吉林大学学报(工学版), 2017, 47(1): 227-234. |
[4] | WEI Xiao-hui, LIU Zhi-liang, ZHUANG Yuan, LI Hong-liang, LI Xiang. Adaptive checkpoint mechanism supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2017, 47(1): 199-207. |
[5] | ZHANG Yi-wen,GUO Rui-feng. Low-power scheduling algorithm for mixed task in real-time system [J]. 吉林大学学报(工学版), 2015, 45(1): 261-266. |
[6] | ZHANG Yi-wen, GUO Rui-feng. Fault-tolerant energy-saving scheduling algorithm base on checkpoint scheme [J]. 吉林大学学报(工学版), 2014, 44(4): 1112-1117. |
[7] | WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang. Lightweight certificateless signature and key agreement scheme for WSNs [J]. 吉林大学学报(工学版), 2014, 44(2): 465-470. |
[8] | CAI Zhao-hui, ZHANG Jian-pei, YANG Jing. Anonymous area estimation method of path data based on Bayesian network [J]. 吉林大学学报(工学版), 2014, 44(2): 454-458. |
[9] | HE Zhong-zheng, MEN Chao-guang, LI Xiang. Schedulability of fault-tolerant real-time system based on checkpoint interval optimization [J]. 吉林大学学报(工学版), 2014, 44(2): 433-439. |
[10] | LUO Wen-jun, GAO Yi-feng. Position-based authentication [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 300-303. |
[11] | ZHAO Xin,WANG Xiao-dong. Efficient self-adaptive broadcast authentication mechanism in wireless sensor networks [J]. 吉林大学学报(工学版), 2011, 41(03): 758-764. |
[12] | DING Yong, HU Jian, LI Ya-Hui, WANG Yu-Min. Anonymous broadcast authentication protocol for wireless sensor networks based on bilinear pairing [J]. 吉林大学学报(工学版), 2011, 41(02): 468-0472. |
[13] | MIAO Feng-Man, ZHANG Qiu-Yu, YUAN Zhan-Ting, ZHANG Qi-Kun, CAI Zhi-Peng. Path choosing and cryptosystem of multitrust domain authentication based on lattice [J]. 吉林大学学报(工学版), 2011, 41(02): 463-0467. |
[14] | ZHU Jian-qi;LIU Yan-heng;YIN Ke;YANG Zhi-gang . Novel dynamic software copyright protection protocol [J]. 吉林大学学报(工学版), 2009, 39(03): 764-0769. |
[15] | LIU Wei-jiang, LIU Qing-huai, AN Yu-wei . Construction of Another Cartesian Authentication Code from Odd Characteristic Orthogonal Geometry [J]. 吉林大学学报(工学版), 2000, 30(01): 63-66. |
|