Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Chuan-gui Ma"'
Publikováno v:
Cloud Computing and Security ISBN: 9783030000110
ICCCS (3)
ICCCS (3)
Secure and efficient authentication protocols are necessary for cloud service. Multi-factor authentication protocols taking advantage of smart card, user’s password and biometric, are more secure than password-based single-factor authentication pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c0f83a9b5bcb95ac921471bc77f614e3
https://doi.org/10.1007/978-3-030-00012-7_9
https://doi.org/10.1007/978-3-030-00012-7_9
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication pro
Publikováno v:
Advanced Materials Research. :1027-1030
Security of mobile IP is very important for seamless roaming in heterogeneous mobile environments. Recently, Dang et al. proposed a new scheme for secure registration procedure of mobile IP. However, we found out that the scheme had three weaknesses
Autor:
Hou-You Chen, Chuan-Gui Ma
Publikováno v:
Journal of Software. 22:782-788
Publikováno v:
Chinese Journal of Computers. 34:38-46
Publikováno v:
Journal of Electronics & Information Technology. 33:587-591
Autor:
Xiao-Fei Ding, Chuan-Gui Ma
Publikováno v:
Chinese Journal of Computers. 33:111-118
Publikováno v:
Journal of Information Science & Engineering; May2018, Vol. 34 Issue 3, p721-732, 12p
Autor:
Chuan-gui Ma, Cong Liu
Publikováno v:
Information Computing and Applications ISBN: 9783642340611
ICICA (LNCS)
ICICA (LNCS)
In 2009, Sun et al. proposed an improved anonymous scheme on Juang et al.'s password-authenticated key exchange (PAKE) sheme using smart cards. Although, this scheme overcomes some weaknesses of Juang et al.'s scheme and achieves user anonymity, it i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a35613433ebcc3c73bc11e8b8d8c3325
https://doi.org/10.1007/978-3-642-34062-8_94
https://doi.org/10.1007/978-3-642-34062-8_94
Publikováno v:
Journal of Information Science & Engineering; Jul2017, Vol. 33 Issue 4, p907-921, 15p