[1] |
Yuan CHEN,Tieming CHEN,Qijie SONG,Dongjie MA.
IBEXSec:a universal security framework for industrial internet terminal access
[J]. Telecommunications Science, 2020, 36(3): 19-26.
|
[2] |
Hui YAO,Siyan MA.
Key technologies and application of artificial intelligence in telecom real-name system
[J]. Telecommunications Science, 2019, 35(5): 51-58.
|
[3] |
Maowen GUO,Rong ZHANG,Yanqing LU,Yan LI.
Technical scheme of the unified account authentication service for operators
[J]. Telecommunications Science, 2018, 34(5): 134-140.
|
[4] |
Zhiliang LIU.
An improved RFID authentication protocol based on quadratic residue
[J]. Telecommunications Science, 2018, 34(4): 90-97.
|
[5] |
Yan LI,Yanqing LU,Rong ZHANG,Maowen GUO.
Authentication scheme of smart home based on eUICC
[J]. Telecommunications Science, 2018, 34(4): 129-135.
|
[6] |
Boxuan LV,Jingwen LIU,Wei XU,Dan WANG,Wenying NIE,Ming HE.
Mobile office system oriented to intelligent terminal
[J]. Telecommunications Science, 2018, 34(2): 115-121.
|
[7] |
Xiaopeng YANG,Haitao CHEN,Lichen MEI,Pengzhan WANG.
Research on quantum key distribution technology in intelligent substation
[J]. Telecommunications Science, 2018, 34(10): 163-169.
|
[8] |
Xun LI,Lin YOU,Jiahao LIANG,Chunhui YAN.
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
[J]. Telecommunications Science, 2018, 34(10): 72-84.
|
[9] |
Wenwen DENG,Chengming SUN,Peiliang QIN.
A bidirectional authentication protocol for mobile RFID system based on PRF
[J]. Telecommunications Science, 2018, 34(10): 96-103.
|
[10] |
Chengyu ZHANG,Rangding WANG,Ling YAO,Songyin FU,Fuqiang ZUO.
A mutual authentication security scheme for mobile NFC devices
[J]. Telecommunications Science, 2017, 33(8): 163-172.
|
[11] |
Chuan LI,Xuejun LI.
A secure authentication method based on hash function for RFID system
[J]. Telecommunications Science, 2017, 33(6): 129-137.
|
[12] |
Wenbin CHENG,Jia LIU.
Realization of smart home key management mechanism based on ECC
[J]. Telecommunications Science, 2017, 33(6): 121-128.
|
[13] |
Jianwu ZHANG,Zejin YAO,Zhendong WU.
Multi-server identity authentication scheme based on biometric and chaotic maps
[J]. Telecommunications Science, 2017, 33(2): 22-31.
|
[14] |
Guorong LIU,Dongxin LIU,Laifu WANG,Jun SHEN,Huamin JIN.
A digital signature scheme based on shared key in intelligent terminal
[J]. Telecommunications Science, 2017, 33(2): 15-21.
|
[15] |
Caiyong HAO.
A survey of mitigating satellite interference technology
[J]. Telecommunications Science, 2017, 33(1): 106-113.
|