[1] |
LIU Xin, LIU Yi.
Two-factor Authentication Scheme Based on Smart Contract
[J]. Computer and Modernization, 2023, 0(10): 121-126.
|
[2] |
LI Wei-qun, CHANG Chao-wen, LI Peng-jing.
Security Authentication Selection Mechanism for Resource-constrained NB-IoT Nodes
[J]. Computer and Modernization, 2023, 0(02): 104-109.
|
[3] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[4] |
CHE Jia-li, REN Jun-ling.
Single Bid Trading Mode Based on Security Performance
[J]. Computer and Modernization, 2021, 0(03): 41-45.
|
[5] |
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2.
Trusted Secure Access Scheme of Ubiquitous Power IoT
[J]. Computer and Modernization, 2020, 0(04): 52-.
|
[6] |
WU Ke-he, CHEN Hong-xiang, LI Wei.
Research on Beidou Secure Transport Protocol Based on SM9 Identity Password
[J]. Computer and Modernization, 2020, 0(02): 41-.
|
[7] |
ZHAO Dong-hao, LU Yu, WANG Zeng-guang, ZHANG La.
One-time Password Authentication Scheme Based on NFC #br# in the Internet of Things Environment
[J]. Computer and Modernization, 2019, 0(03): 107-.
|
[8] |
HAN Xiao, ZENG Qi, CAO Yong-ming .
An Efficient Proxy Re-encryption Scheme with Keyword Search
[J]. Computer and Modernization, 2019, 0(03): 117-.
|
[9] |
JIAN Bi-yuan1, WANG Hai-tao2, LIU Dao-wei1.
A RFID Mutual-authentication Protocol
[J]. Computer and Modernization, 2017, 0(7): 107-110.
|
[10] |
MAO Yu-fang, DENG Lun-zhi.
An Identity-based Blind Signature Scheme and Its Security Proof
[J]. Computer and Modernization, 2017, 0(4): 105-108.
|
[11] |
SHEN Hai-bo.
Delegation Authorization Framework Based on OAuth 2.0
[J]. Computer and Modernization, 2016, 0(8): 105-108+122.
|
[12] |
HAO Yu-wen1, TIAN Xiao2, LI Xiao-xue1, ZHAO Zhe1, ZHENG Jing-chen1, YANG Yang3.
A Novel Authentication Scheme on The Internet of Things Based on Aggregate Signature
[J]. Computer and Modernization, 2016, 0(6): 103-106.
|
[13] |
WEI Shu-min, ZHANG Yong-hua, SHANG Yu-fang.
Research and Design of Lightweight Mobile RFID Authentication Protocol
[J]. Computer and Modernization, 2016, 0(11): 74-78.
|
[14] |
XIAO Yue-lei1,2,3, ZHU Zhi-xiang1,2, ZHANG Yong1,2.
Security Analysis of Tri-element Peer Authentication Mechanism
[J]. Computer and Modernization, 2015, 0(6): 1-6+31.
|
[15] |
ZHANG Wei-wei, GUO Feng-ying, HAN Ai-qing.
Access Database Login Authentication Systems Based on Various Types of Macros
[J]. Computer and Modernization, 2015, 0(5): 121-126.
|