[1] |
LIU Xin, LIU Yi.
Two-factor Authentication Scheme Based on Smart Contract
[J]. Computer and Modernization, 2023, 0(10): 121-126.
|
[2] |
LI Wei-qun, CHANG Chao-wen, LI Peng-jing.
Security Authentication Selection Mechanism for Resource-constrained NB-IoT Nodes
[J]. Computer and Modernization, 2023, 0(02): 104-109.
|
[3] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[4] |
YANG Xiao-dong.
Risk Assessment Model of Accounting Resource Sharing Management Based on Genetic Algorithm
[J]. Computer and Modernization, 2021, 0(06): 24-28.
|
[5] |
CHE Jia-li, REN Jun-ling.
Single Bid Trading Mode Based on Security Performance
[J]. Computer and Modernization, 2021, 0(03): 41-45.
|
[6] |
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2.
Trusted Secure Access Scheme of Ubiquitous Power IoT
[J]. Computer and Modernization, 2020, 0(04): 52-.
|
[7] |
WU Ke-he, CHEN Hong-xiang, LI Wei.
Research on Beidou Secure Transport Protocol Based on SM9 Identity Password
[J]. Computer and Modernization, 2020, 0(02): 41-.
|
[8] |
ZHAO Dong-hao, LU Yu, WANG Zeng-guang, ZHANG La.
One-time Password Authentication Scheme Based on NFC #br# in the Internet of Things Environment
[J]. Computer and Modernization, 2019, 0(03): 107-.
|
[9] |
JIAN Bi-yuan1, WANG Hai-tao2, LIU Dao-wei1.
A RFID Mutual-authentication Protocol
[J]. Computer and Modernization, 2017, 0(7): 107-110.
|
[10] |
SHEN Hai-bo.
Delegation Authorization Framework Based on OAuth 2.0
[J]. Computer and Modernization, 2016, 0(8): 105-108+122.
|
[11] |
HAO Yu-wen1, TIAN Xiao2, LI Xiao-xue1, ZHAO Zhe1, ZHENG Jing-chen1, YANG Yang3.
A Novel Authentication Scheme on The Internet of Things Based on Aggregate Signature
[J]. Computer and Modernization, 2016, 0(6): 103-106.
|
[12] |
WEI Shu-min, ZHANG Yong-hua, SHANG Yu-fang.
Research and Design of Lightweight Mobile RFID Authentication Protocol
[J]. Computer and Modernization, 2016, 0(11): 74-78.
|
[13] |
XIAO Yue-lei1,2,3, ZHU Zhi-xiang1,2, ZHANG Yong1,2.
Security Analysis of Tri-element Peer Authentication Mechanism
[J]. Computer and Modernization, 2015, 0(6): 1-6+31.
|
[14] |
ZHANG Wei-wei, GUO Feng-ying, HAN Ai-qing.
Access Database Login Authentication Systems Based on Various Types of Macros
[J]. Computer and Modernization, 2015, 0(5): 121-126.
|
[15] |
ZHAO Jiang-yun, DONG Ping, GAO De-yun.
Authentication Mechanism in Mobile Routing System
[J]. Computer and Modernization, 2015, 0(3): 117-121,126.
|