… multi-factor identity authentication for ZigBee network nodes was proposed. The scheme bound the fresh factor updated in a particular cycle with hardware information … securityanalysis …
燕雪峰, 丁叶 - Journal of Data Acquisition & Processing/Shu …, 2020 - search.ebscohost.com
… Big data driven intelligent workshop operation analysis and decision method system [J]. Computer … Application analysis of remote file synchronization technology[J]. China New …
… , a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed. By analyzing the authentication message flow model of the protocol and modeling it using colored …
… analyzed, and it was compared with the same type of schemes. Finally, taking multi-factor … in the application scenario of electronic credentials was analyzed.The result shows that the …
… to scenarios where identity authentication is needed, especially the identity authentication in the network environment. As a new approach for identity authentication, biometrics is …
… Multi-factor user authentication scheme for multi-gateway wireless sensor networks. Chinese J … , and intelligent interconnection of 6G networks will cause unknown and complex security …
… The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication. By using symmetric …
… analysis, including search, recommendation, streaming, and content delivery. Since artificial intelligence … To answer this question, we introduce the concept of multimedia intelligence by …
… Our overview is focused on the three perspectives as following: 1) A brief introduction to Deepfake forgery technologies and their impact; 2) A systematic summary of current proactive …