authentication相关论文
Application of Ant Colony Algorithm in Fingerprint Identification System Based on Internet of Things
The Internet of things is a network which connected to objects through the Internet,internet was treated as the foundati......
Recent development of the peer-to-peer(P2P)live streaming technique has brought unprecedented new momentum to the Intern......
Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public ......
Active networks are a new kind of packet-switched networks in which packets have code fragments that are executed on the......
The demand for communications anywhere, anytime, and on any device without recording the date is growing with the develo......
阜阳市局 £4a 局长——_MINtkMMtgj’#lnH$B——q.M——D收束志不他只邀狲位J则【科校为先导推动地租工作.B为广为戳民U用凶盼引眯B.......
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, ......
<正>谁执行修改并不重要,关键是谁对修改之处加以证实。信用证业务中,单据是否可以修改,修改后是否需要证实,谁来证实及如何证实等......
The radio frequency identification(RFID) technology has been widely used so far in industrial and commercial application......
Vehicular Ad-hoc NETworks(VANETs)enable cooperative behaviors in vehicular environments and are seen as an integral comp......
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service p......
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service p......
Function S-rough sets are defined by R-function equivalence class, which have dynamic characteristic. Function S-rough s......
According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth- based au......
According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth- based au......
There are two types of base stations in the long term evolution (LTE) wireless networks, home eNodeB (HeNB) and eNodeB (......
Wireless transmission is becoming increasing ubiquitous, but there is a big black hole in the security of this kind of n......
Abstract Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect th......
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to......
平安城市的发展致力于大安全防护体系,重点保障各种网络中资源的有效融合,并保障资源再使用过程中的可控可管,既保证有效用户对资......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
系统采用3G网络来改进TCP/IP网络体系的安全,同时采用WAP协议框架中的安全传输协议、安全网关和安全层次以及加强数据传输过程中的......
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diff
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propos......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
Authentication of Cassia seeds on the basis of two-wavelength HPLC fingerprinting with the use of ch
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
随着智能手机和3G通信技术的迅速发展,移动应用安全问题日益突显。文章分析了移动应用中出现的安全隐患,从移动用户认证的角度,对......
电子邮件作为一种常见通信方式,在互联网内应用广泛,因此也衍生出针对电子邮件真实性方面的鉴定需求。目前国内对于电子邮件鉴定研......
An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite ext......
The new generation of networked business solutions brings legacy data and applications to the world wide Web, and lets c......
Two ID-based authenticated group key agreement schemes, proposed by Choi et al and Du et al, are insecure against an imp......
提出了一个安全的动态口令鉴别 (认证 )方案 (SDPA) ,该方案适合于不安全的网络信道上鉴别用户身分 .与以前相关的方法比较 ,作者......
各种无线传输技术在覆盖面积、频谱带宽及时延方面都有一定的局限性,能有效解决上述局限性的“异构网络高速无线接入”概念日益受到......
Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaot......
In the proposed photo certificate, the principal component is the image, for example, the user’s photo. User-related fi......
身份认证是指在计算机网络中确认操作者身份的过程。目前常见的身份认证方式虽然在互联网上得到广泛的使用,但应用于军工涉密网络......
本文依据目前无线网络的广泛应用与发展,分析了无线局域网面临的安全威胁,针对无线局域网的技术标准,在无线局域网中可能使用的加......
提出一种融合角点特征匹配算法的人脸优化识别方法。采用主成分分析方法对人脸图像进行三角剖分,通过统一框架下的纹理映射,对人脸在......
The stronglink with multi-try function based on MEMS technology and the PC startup in authentication system have been de......
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some ......
Handoff in IEEE 802.11 requires the repeated authentication and key exchange procedures,which will make the provision of......
随着无线传感器网络的发展,外部用户可以直接访问传感器内部节点获取信息,因此如何认证外部用户的身份,只允许授权用户获取节点数......
Network mobility (NEMO) is a protocol proposed for the mobility management of a whole network.It offers seamless Interne......
Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authen......
Online social networks (OSNs) have revolutionarily changed the way people connect with each other. One of the main facto......
IEC 62351标准建议GOOSE报文采用HMAC方法以保证报文完整性,但由于没有考虑报文心跳机制和具体的报文特点,GOOSE报文直接应用HMAC......
A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing al-gorithms th......
SSL技术在互联网安全通信领域应用广泛,尤其近年来电子商务发展迅速,SSL协议由于可以提供网络信息的安全传输,受到了广大电子网站......
Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key......
RADIUS代理是设置在BRAS和RADIUS服务器之间的代理设备,完成RADIUS消息转发。RADIUS代理通过"不转发,自己应答"和"修改RADIUS会话的报......