咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 信息与通信工程
    • 12 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 19 篇 distributed auth...
  • 4 篇 security
  • 3 篇 wlan
  • 3 篇 authentication
  • 3 篇 blockchain
  • 2 篇 smart contracts
  • 2 篇 wireless mesh ne...
  • 2 篇 iot
  • 2 篇 servers
  • 2 篇 centralized auth...
  • 2 篇 cloud computing
  • 2 篇 blockchains
  • 2 篇 kerberos
  • 1 篇 short valid auth...
  • 1 篇 mobility
  • 1 篇 shared generatio...
  • 1 篇 apache spark
  • 1 篇 gabe
  • 1 篇 consensus contro...
  • 1 篇 clustering

机构

  • 1 篇 samsung adv inst...
  • 1 篇 univ manchester ...
  • 1 篇 baotou normal un...
  • 1 篇 princess nourah ...
  • 1 篇 zhongnan univ ec...
  • 1 篇 umm al qura univ...
  • 1 篇 tianjin broadcas...
  • 1 篇 zhongnan univ ec...
  • 1 篇 informat & commi...
  • 1 篇 technol innovat ...
  • 1 篇 inner mongolia u...
  • 1 篇 northeastern uni...
  • 1 篇 informat commun ...
  • 1 篇 mech engn coll d...
  • 1 篇 univ maryland bl...
  • 1 篇 samsung ait comm...
  • 1 篇 mech engn coll d...
  • 1 篇 univ maryland co...
  • 1 篇 univ elect sci &...
  • 1 篇 school of electr...

作者

  • 2 篇 lee insun
  • 2 篇 lee jihoon
  • 1 篇 wang hx
  • 1 篇 zhang ning
  • 1 篇 younis mohamed
  • 1 篇 han yunxia
  • 1 篇 alshaeri abdulaz...
  • 1 篇 li shanshan
  • 1 篇 liu jianqing
  • 1 篇 luo wenli
  • 1 篇 kim daeyoung
  • 1 篇 lopez martin and...
  • 1 篇 kirn daeyoung
  • 1 篇 muhaidat sami
  • 1 篇 arbaugh william
  • 1 篇 liu dongxiang
  • 1 篇 paul j. e. velth...
  • 1 篇 pei tian
  • 1 篇 lu yu
  • 1 篇 geng fanghua

语言

  • 17 篇 英文
  • 2 篇 其他
检索条件"主题词=distributed authentication"
19 条 记 录,以下是11-20 订阅
排序:
Bounds and constructions for threshold shared generation of authenticators
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2002年 第12期79卷 1285-1301页
作者: Safavi-Naini, R Wang, HX Univ Wollongong Sch Informat Technol & Comp Sci Wollongong NSW 2522 Australia
Shared generation of authenticator systems (or SGA-systems) generalise Simmons' traditional authentication codes when authenticators for source states are produced by collaboration of a group of senders, rather th... 详细信息
来源: 评论
Two Different Schemes of authentication in IEEE 802.16j Multi-hop Relay Network
Two Different Schemes of Authentication in IEEE 802.16j Mult...
收藏 引用
8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)
作者: Yang Fan Qian Yali Zhongnan Univ Econ & Law Sch Informat & Safety Engn Wuhan Peoples R China
IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. There are some issues requiring deeply thinking in the multihop relay network. One of the major issues is... 详细信息
来源: 评论
ACCESS authentication SCHEMES FOR PMIPV6: A SURVEY  10
ACCESS AUTHENTICATION SCHEMES FOR PMIPV6: A SURVEY
收藏 引用
10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Gao, Tianhan Guo, Nan Geng, Fanghua Deng, Xinyang Northeastern Univ Software Coll Shenyang Peoples R China Northeastern Univ Sch Comp Sci & Engn Shenyang Peoples R China
PMIPv6 is a network-based mobility management protocol which extends MIPv6 protocol and reduces the configuration load on mobile node's side. However, security issues are the main obstacle for the proliferation of... 详细信息
来源: 评论
A security architecture for IEEE 802.11 wireless networks in large-scale multinational corporations
A security architecture for IEEE 802.11 wireless networks in...
收藏 引用
6th International Conference on ITS Telecommunications Proceedings
作者: Wei, Nan Zhou, Jianying Xin, Yan Li, Liying Natl Univ Singapore 6 Pari Dedap Walk 07-01 Singapore 486060 Singapore Inst Infocomm Res Singapore 119613 Singapore Natl Univ Singapore Singapore 117548 Singapore Univ Elect Sci & Technol China Chengdu 610054 Peoples R China
Nowadays, wireless Local Area Networks (WLANs) are widely used in various environments, including business, education, government, public and individual. However, because the attacks against WLANs are easier than LAN,... 详细信息
来源: 评论
A Time-Bound Continuous authentication Protocol for Mesh Networking  4
A Time-Bound Continuous Authentication Protocol for Mesh Net...
收藏 引用
4th International Conference on Advanced Communication Technologies and Networking (CommNet)
作者: Shrestha, Selina Lopez, Martin Andreoni Baddeley, Michael Muhaidat, Sami Giacalone, Jean-Pierre Khalifa Univ Abu Dhabi U Arab Emirates Technol Innovat Inst TII Secure Syst Res Ctr SSRC Abu Dhabi U Arab Emirates
This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes pla... 详细信息
来源: 评论
Research on Scheme of Attribute Identity authentication System in Broadcasting Monitoring System  2
Research on Scheme of Attribute Identity Authentication Syst...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Jiyuan Yang Pei Tian Information Engineering College Communication University of China
The identity authentication system is based on multiattribute and identity in broadcasting monitoring *** scheme mainly uses the multi-attribute encryption AttributeBased Encryption(ABE) as the core,draws Identity-Bas... 详细信息
来源: 评论
New authentication mechanism using certificates for big data analytic tools
New authentication mechanism using certificates for big data...
收藏 引用
作者: PAUL J. E. VELTHUIS KTH ROYAL INSTITUTE OF TECHNOLOGY
学位级别:硕士
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Fli... 详细信息
来源: 评论
Energy optimization with authentication and cost effective storage in the wireless sensor IoTs using blockchain
收藏 引用
COMPUTATIONAL INTELLIGENCE 2024年 第1期40卷 e12630-e12630页
作者: Alghamdi, Turki Ali Javaid, Nadeem Umm Al Qura Univ Coll Comp & Informat Syst Dept Comp Sci Mecca Saudi Arabia COMSATS Univ Islamabad Dept Comp Sci Islamabad 44000 Pakistan
In this paper, a hybrid blockchain-based authentication scheme is proposed that provides the mechanism to authenticate the randomly distributed sensor IoTs. These nodes are divided into three types: ordinary nodes, cl... 详细信息
来源: 评论
Micro Cloud for Security Content Delivery
Micro Cloud for Security Content Delivery
收藏 引用
2016 International Conference on Mathematical, Computational and Statistical Sciences and Engineering(MCSSE 2016)
作者: Xin WANG School of Electronic Information Engineering Tianjin University Tianjin Broadcast and Television Network Co. Ltd.
Cloud Computing has made software more attractive as a service and transformed a large part of IT industry. At present, cloud computing is a popular topic for conferences and magazines. The unique attribute of cloud c... 详细信息
来源: 评论