has been cited by the following article(s):
[1]
|
Design and Research of a Dual and Bidirectional Certificateless Identity Authentication Scheme Based on Hybrid SM Series Algorithms
Proceedings of the 2023 11th International Conference on Computer and Communications Management,
2023
DOI:10.1145/3617733.3617740
|
|
|
[2]
|
The identity authentication of Wi-Fi system based on network security
Annals of Telecommunications,
2021
DOI:10.1007/s12243-020-00793-0
|
|
|
[3]
|
A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment
Proceedings of the 2019 8th International Conference on Networks, Communication and Computing,
2019
DOI:10.1145/3375998.3376011
|
|
|
[4]
|
A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment
Proceedings of the 2019 8th International Conference on Networks, Communication and Computing,
2019
DOI:10.1145/3375998.3376011
|
|
|
[5]
|
A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment
Proceedings of the 2019 8th International Conference on Networks, Communication and Computing,
2019
DOI:10.1145/3375998.3376011
|
|
|
[6]
|
Physical Intrusion Detection System Based on Behavioral Sign Recognition
2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS),
2018
DOI:10.1109/MASS.2018.00078
|
|
|