Author:
Xie Haijiang,Zhao Jizhong
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference37 articles.
1. Butler KRB, Ryu S, Traynor P, McDaniel PD (2009) Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1803–1815, 2009-01-01
2. Byeong-Thaek O, Sang-Bong L, Ho-Jin P (2008) A Peer Mutual Authentication Method using PKI on Super Peer based Peer-to-Peer Systems. In Advanced Communication Technology. ICACT 2008. 10th International Conference on, 2008, pp. 2221–2225
3. Lamport L (1981) Password authentication with insecure communication, Communications of ACM, no. 24, pp. 770–772
4. Neuman BC, Ts’O T (1994) Kerberos: an authentication service for computer networks, Communications Magazine, IEEE, vol. 32, pp. 33–38, 1994-01-01
5. Rhee K, Kwark, Kim S, Won D (2005) Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. 3450: p. 70–84
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献