Subject
Hardware and Architecture,Software
Reference46 articles.
1. Cryptography and Network Security: Principles and Practice;Stallings,2003
2. Security policies and procedures;Greene,2006
3. A secure remote user mutual authentication scheme using smart cards;Karuppiah;J. Inf. Secur. Appl.,2014
4. A secure authentication scheme with user anonymity for roaming service in global mobility networks;Karuppiah;Wirel. Pers. Commun.,2015
5. A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks;Karuppiah;Wirel. Pers. Commun.,2017
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献