咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 22 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 15 篇 计算机科学与技术...
    • 10 篇 电子科学与技术(可...
    • 7 篇 电气工程
    • 7 篇 网络空间安全
    • 4 篇 信息与通信工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物医学工程(可授...
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 物理学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 22 篇 smart card
  • 5 篇 authentication
  • 3 篇 password
  • 2 篇 multi-server
  • 2 篇 user anonymity
  • 2 篇 key agreement
  • 2 篇 biometrics
  • 2 篇 nonce
  • 2 篇 cryptography
  • 2 篇 mutual authentic...
  • 2 篇 security
  • 2 篇 user authenticat...
  • 2 篇 password authent...
  • 1 篇 key exchange pro...
  • 1 篇 public transport...
  • 1 篇 elliptic curve c...
  • 1 篇 chip operating s...
  • 1 篇 two-factor
  • 1 篇 fingerprint feat...
  • 1 篇 shared signature

机构

  • 2 篇 college of compu...
  • 1 篇 hangzhou key lab...
  • 1 篇 school of sci. h...
  • 1 篇 school of softwa...
  • 1 篇 department of co...
  • 1 篇 center for indus...
  • 1 篇 2harbin universi...
  • 1 篇 national compute...
  • 1 篇 school of comput...
  • 1 篇 department of ap...
  • 1 篇 school of scienc...
  • 1 篇 with the departm...
  • 1 篇 school of mathem...
  • 1 篇 information engi...
  • 1 篇 automobile manag...
  • 1 篇 school of comput...
  • 1 篇 department of ne...
  • 1 篇 department of in...
  • 1 篇 school of scienc...
  • 1 篇 school of comput...

作者

  • 1 篇 zhang yuqing
  • 1 篇 duo liu
  • 1 篇 ya-fen chang pei...
  • 1 篇 liguo zhang
  • 1 篇 yiqi shi
  • 1 篇 3. college of in...
  • 1 篇 jaewook jung
  • 1 篇 董娜
  • 1 篇 kang baoyuan
  • 1 篇 zhengzhou 450001...
  • 1 篇 qin zhong-ping
  • 1 篇 刘文浩
  • 1 篇 wang bangju1 2 w...
  • 1 篇 xu maozhi
  • 1 篇 shen zhong-hua
  • 1 篇 dilip kumar
  • 1 篇 zheng zhiming
  • 1 篇 qian kun
  • 1 篇 nicola dragoni
  • 1 篇 王圣宝

语言

  • 17 篇 英文
  • 5 篇 中文
检索条件"主题词=smart card"
22 条 记 录,以下是1-10 订阅
排序:
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Digital signature systems based on smart card and fingerprint feature
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第4期18卷 825-834页
作者: You Lin Xu Maozhi Zheng Zhiming Coll. of Communication Engineering Hangzhou Dianzi Univ. Hangzhou 310018 P. R. China School of Mathematics Peking University Beijing 100871 P. R. China School of Science Beijing Univ. of Aeronautics and Astronautics Beijing 100083 P. R. China
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Provably Secure General Construction for Key Exchange Protocols Using smart card and Password
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 271-278页
作者: ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using smart card
收藏 引用
Journal of Electronic Science and Technology 2018年 第1期16卷 45-49页
作者: Jaewook Jung Donghoon Lee Hakjun Lee Dongho Won Department of Computer Engineering Sungkyunkwan UniversityGyeonggi-do 16419
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Robust Password and smart card Based Authentication Scheme with smart card Revocation
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2014年 第4期19卷 418-424页
作者: 谢琪 刘文浩 王圣宝 胡斌 董娜 于秀源 Hangzhou Key Laboratory of Cryptography and Network Security Hangzhou Normal University
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anonymous Authentication Scheme Based on smart card and Biometrics in the Electronic Medical Environment
收藏 引用
Wuhan University Journal of Natural Sciences 2021年 第2期26卷 183-190页
作者: PU Guangning YIN Fengmei Information Engineering Faculty Anhui Finance and Trade Vocational CollegeHefei 230601AnhuiChina School of Computer Science and Technology Hefei Normal UniversityHefei 230601AnhuiChina
With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the ele... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH smart card
收藏 引用
Journal of Electronics(China) 2012年 第6期29卷 550-555页
作者: Jing Chao Department of NetWork School of Electronics and Computer Science and TechnologyNorth University of China
This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A multi-bank and off-line e-cash scheme based on smart card
A multi-bank and off-line e-cash scheme based on smart card
收藏 引用
全国第十届企业信息化与工业工程学术年会
作者: Liu Wenyuan1, Si Yali1, Liu Yongshan1, Wang Yadong2 (1.Information Science and Engineering Institute, Yanshan University, Qinhuangdao 066004, P.R.China) (2.Computer Science and Engineering Institute, Harbin Institute of Technology, Harbin 150001, P.R.China)
The multi-bank e-cash is an important research towards pushing electronic commerce into practice, but the double-spending problem of this off-line scheme will cause a great loss to the bank. In order
来源: cnki会议 评论
A Study of Telecom Application Services based on smart card
A Study of Telecom Application Services based on Smart Card
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Da GUO~(1,2),Min LIN~(1,2),Jun LIAO(1 2) 1 Beijing University of Post & Telecom 2 China United Network Communications Group Company Limited Postdoctoral Workstation
<正>This paper elaborates the state of the art of the smart card development from the perspectives of hardware capability and features extension.It also analyses the potential improvement capability(from the new de... 详细信息
来源: cnki会议 评论
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment
收藏 引用
Frontiers of Computer Science 2015年 第1期9卷 142-156页
作者: Peng JIANG Qiaoyan WEN Wenmin LI Zhengping JIN Hua ZHANG State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
As service demands rise and expand single-server user authentication has become unable to satisfy actual application demand. At the same time identity and password based authentication schemes are no longer adequate b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论