咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 信息与通信工程
    • 12 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 19 篇 distributed auth...
  • 4 篇 security
  • 3 篇 wlan
  • 3 篇 authentication
  • 3 篇 blockchain
  • 2 篇 smart contracts
  • 2 篇 wireless mesh ne...
  • 2 篇 iot
  • 2 篇 servers
  • 2 篇 centralized auth...
  • 2 篇 cloud computing
  • 2 篇 blockchains
  • 2 篇 kerberos
  • 1 篇 short valid auth...
  • 1 篇 mobility
  • 1 篇 shared generatio...
  • 1 篇 apache spark
  • 1 篇 gabe
  • 1 篇 consensus contro...
  • 1 篇 clustering

机构

  • 1 篇 samsung adv inst...
  • 1 篇 univ manchester ...
  • 1 篇 baotou normal un...
  • 1 篇 princess nourah ...
  • 1 篇 zhongnan univ ec...
  • 1 篇 umm al qura univ...
  • 1 篇 tianjin broadcas...
  • 1 篇 zhongnan univ ec...
  • 1 篇 informat & commi...
  • 1 篇 technol innovat ...
  • 1 篇 inner mongolia u...
  • 1 篇 northeastern uni...
  • 1 篇 informat commun ...
  • 1 篇 mech engn coll d...
  • 1 篇 univ maryland bl...
  • 1 篇 samsung ait comm...
  • 1 篇 mech engn coll d...
  • 1 篇 univ maryland co...
  • 1 篇 univ elect sci &...
  • 1 篇 school of electr...

作者

  • 2 篇 lee insun
  • 2 篇 lee jihoon
  • 1 篇 wang hx
  • 1 篇 zhang ning
  • 1 篇 younis mohamed
  • 1 篇 han yunxia
  • 1 篇 alshaeri abdulaz...
  • 1 篇 li shanshan
  • 1 篇 liu jianqing
  • 1 篇 luo wenli
  • 1 篇 kim daeyoung
  • 1 篇 lopez martin and...
  • 1 篇 kirn daeyoung
  • 1 篇 muhaidat sami
  • 1 篇 arbaugh william
  • 1 篇 liu dongxiang
  • 1 篇 paul j. e. velth...
  • 1 篇 pei tian
  • 1 篇 lu yu
  • 1 篇 geng fanghua

语言

  • 17 篇 英文
  • 2 篇 其他
检索条件"主题词=distributed authentication"
19 条 记 录,以下是1-10 订阅
排序:
distributed authentication of program integrity verification in wireless sensor networks
收藏 引用
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2008年 第3期11卷 1–35页
作者: Chang, Katharine Shin, Kang G. Univ Michigan Dept Elect Engn & Comp Sci Real Time Comp Lab Comp Sci & Engn Div Ann Arbor MI 48109 USA
Security in wireless sensor networks has become important as they are being developed and deployed for an increasing number of applications. The severe resource constraints in each sensor make it very challenging to s... 详细信息
来源: 评论
distributed authentication in the Cloud Computing Environment  15th
Distributed Authentication in the Cloud Computing Environmen...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Liu, Yanzhu Li, Zhi Sun, Yuxia Univ Sci & Technol Sch Comp & Commun Engn Beijing 100083 Peoples R China
The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to improve the... 详细信息
来源: 评论
A Blockchain-Based Secure distributed authentication Scheme for Internet of Vehicles
收藏 引用
IEEE ACCESS 2024年 12卷 81471-81482页
作者: Ma, Zhanfei Jiang, Jing Wei, Hui Wang, Bisheng Luo, Wenli Luo, Haoye Liu, Dongxiang Baotou Normal Univ Sch Informat Sci & Technol Baotou 014010 Peoples R China Inner Mongolia Univ Sci & Technol Sch Digital & Intelligence Ind Baotou 014010 Peoples R China
authentication for the Internet of Vehicles (IoV) is essential for safe IoV connection. However, because of the peculiar structure of IoV, current authentication schemes heavily rely on Road Side Units (RSUs). An exce... 详细信息
来源: 评论
A distributed authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2022年 第5期71卷 5284-5297页
作者: Xue, Kaiping Luo, Xinyi Ma, Yongjin Li, Jian Liu, Jianqing Wei, David S. L. Univ Sci & Technol China Sch Cyber Sci & Technol Hefei 230027 Anhui Peoples R China Univ Sci & Technol China Dept Elect Engn & Informat Sci Hefei 230027 Anhui Peoples R China Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA Fordham Univ Comp & Informat Sci Dept Bronx NY 10458 USA
Secure and real-time communication is an essential condition in mobile vehicular networks, and this requires secure authentication and seamless access enabled by roaming services. As a security inspector, roaming auth... 详细信息
来源: 评论
Dynamic distributed authentication Scheme for Wireless LAN-Based Mesh Networks
收藏 引用
International Conference on Information Networking (ICOIN 2007)
作者: Lee, Insun Lee, Jihoon Arbaugh, William Kim, Daeyoung Samsung Adv Inst Technol Comm & Conncet Lab POBox 111 Suwon 449716 South Korea Univ Maryland College Pk MD 20742 USA Informat & Comminicat Univ Daejeon South Korea
Wireless LAN systems have been deployed for wireless internet services for hot spots, home, or offices. Recently, WLAN-Based Mesh Networking is developed with the benefit of easy deployment and easy configuration. Due... 详细信息
来源: 评论
Efficient distributed authentication method with local proxy for Wireless Mesh Networks
Efficient distributed authentication method with local proxy...
收藏 引用
IEEE Wireless Communications and Networking Conference
作者: Lee, Insun Lee, Jihoon Kirn, Daeyoung Samsung AIT Commun Lab Seoul South Korea Informat Commun Univ Daejeon South Korea
WLAN-Based Mesh Networking is being developed with the benefit of easy deployment and easy configuration to overcome the limitation of a single- hop communication in terms of coverage, cost, capacity, scalability, etc... 详细信息
来源: 评论
Two-factor distributed authentication Scheme for Cloud Storage  9
Two-factor Distributed Authentication Scheme for Cloud Stora...
收藏 引用
9th International Conference on Computer and Communication Systems (ICCCS)
作者: Han, Yunxia Xu, Chunxiang Li, Shanshan Lu, Jingjie Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu Peoples R China Zhongnan Univ Econ & Law Sch Informat Engn Wuhan Peoples R China
distributed authentication plays a crucial role in cloud storage, requiring users to authenticate their identity to a set of key management servers. This process guarantees that only authenticated users gain access to... 详细信息
来源: 评论
Design and Optimization of distributed authentication Mechanism for Equipment Support Information Network
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2015年 第7期16卷 1291-1297页
作者: Yan, Jie Lu, Yu Chen, Li-yun Mech Engn Coll Dept Equipment Command & Management Beijing Peoples R China Mech Engn Coll Dept Informat Engn Beijing Peoples R China
Because of the threats existing in the identity authentication for equipment support information network, a cluster-based distributed authentication mechanism and an optimal design method for distributed CA are propos... 详细信息
来源: 评论
distributed Hardware-Assisted authentication and Key Agreement Protocol for Internet of Things  21
Distributed Hardware-Assisted Authentication and Key Agreeme...
收藏 引用
IEEE 21st Consumer Communications and Networking Conference (CCNC)
作者: Alshaeri, Abdulaziz Younis, Mohamed Univ Maryland Blatimore Cty Dept Comp Sci & Elect Engn Baltimore MD 21228 USA
Physically Unclonable Functions (PUFs) are lightweight hardware primitives that provide an effective secure-by-design solution for mutual authentication of the resource-constrained Internet of Things (IoT) devices. By... 详细信息
来源: 评论
Secure, ID Privacy and Inference Threat Prevention Mechanisms for distributed Systems
收藏 引用
IEEE ACCESS 2023年 11卷 3766-3780页
作者: Aljohani, Tahani Hamad Zhang, Ning Princess Nourah Bint Abdul Rahman Univ Coll Comp & Informat Sci Riyadh 11564 Saudi Arabia Univ Manchester Sch Comp Sci Manchester M13 9PL England
This paper investigates facilitating remote collection of a patient's data in distributed system while protecting the security of the data, preserving the privacy of the patient's ID, and preventing inference ... 详细信息
来源: 评论