Subject
Law,General Computer Science
Reference15 articles.
1. A logic of authentication;Burrows;R. Soc. Lond. A,1989
2. EAP extensions for the EAP re-authentication protocol (ERP);Cao,2012
3. Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications;Chen;J. Ambient Intell. Hum.Comput.,2019
4. A secure authentication protocol for internet of vehicles;Chen;IEEE Access,2019
5. Extensible authentication protocol (EAP) and IEEE 802.1 x: tutorial and empirical experience;Chen;IEEE Commun. Mag.,2005
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献