[1] |
Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN.
A Scheme of Measurement for Terminal Equipment Based on DICE in IoT
[J]. Netinfo Security, 2020, 20(4): 21-30.
|
[2] |
Xiaofen LIU, Xiaofeng CHEN, Guiren LIAN, Song LIN.
Authenticated Multiparty Quantum Secret Sharing Protocol with d-level Single Particle
[J]. Netinfo Security, 2020, 20(3): 51-55.
|
[3] |
Lin HOU, Da FENG, Pengkai XUAN, Fucai ZHOU.
Outsourcing Database Join Query Verification Scheme Based on Authentication Tree
[J]. Netinfo Security, 2020, 20(2): 91-97.
|
[4] |
Die HU, Dongtang MA, Ming GONG, Zhao MA.
A Physical Layer Security Authentication Method Based on PUF
[J]. Netinfo Security, 2020, 20(1): 61-66.
|
[5] |
Jian KANG, Jie WANG, Zhengxu LI, Guangda ZHANG.
A Model for Anomaly Intrusion Detection with Different Feature Extraction Strategies in IoT
[J]. Netinfo Security, 2019, 19(9): 21-25.
|
[6] |
Fuyou ZHANG, Qiongxiao WANG, Li SONG.
Research on Unified Identity Authentication System Based on Biometrics
[J]. Netinfo Security, 2019, 19(9): 86-90.
|
[7] |
Baoyuan KANG, Mingming XIE, Lin SI.
Research on a Biometrics-based Multi-cloud Server Authentication Scheme
[J]. Netinfo Security, 2019, 19(6): 45-52.
|
[8] |
Ruiying CHEN, Zemao CHEN, Hao WANG.
Design and Optimization of Security Monitoring and Controlling Protocol in Industrial Control Systems
[J]. Netinfo Security, 2019, 19(2): 60-69.
|
[9] |
Yongshuang WEI, Jianhua CHEN, Yongmei WEI.
Security Authentication Protocol for RFID/NFC Based on Elliptic Curve Cryptography
[J]. Netinfo Security, 2019, 19(12): 64-71.
|
[10] |
Shun ZHANG, Zhangkai CHEN, Fengyu LIANG, Runhua SHI.
A Quantum Identity Authentication Based on Bell State
[J]. Netinfo Security, 2019, 19(11): 43-48.
|
[11] |
Min ZHANG, Chunxiang XU, Minying HUANG.
Research on Multi-server Lightweight Multi-factor Authentication Protocol in Telemedicine Environment
[J]. Netinfo Security, 2019, 19(10): 42-49.
|
[12] |
Mengmeng YAO, Zhengchao ZHU, Mingda LIU.
An Improved Formal Analysis Method Based on Authentication Tests
[J]. Netinfo Security, 2019, 19(1): 27-33.
|
[13] |
Wenjiang HAO, Fei SONG, Yueliang WAN.
Research on Security Authentication Protocol for Wearable Police Devices
[J]. Netinfo Security, 2018, 18(9): 25-29.
|
[14] |
Qiongqiong DUAN, Dinghua XIANG, Hongzhou SHI.
Design on the Blockchain-based Authentication for Smart Objects
[J]. Netinfo Security, 2018, 18(9): 95-101.
|
[15] |
Wei HU, Qiuhan WU, Shengli LIU, Wei FU.
Design of Secure eID and Identity Authentication Agreement in Mobile Terminal Based on Guomi Algorithm and Blockchain
[J]. Netinfo Security, 2018, 18(7): 7-9.
|