Open Access
Issue
MATEC Web Conf.
Volume 173, 2018
2018 International Conference on Smart Materials, Intelligent Manufacturing and Automation (SMIMA 2018)
Article Number 03019
Number of page(s) 4
Section Digital Signal and Image Processing
DOI https://doi.org/10.1051/matecconf/201817303019
Published online 19 June 2018
  1. C.L. Li, L.F. Wang, Z.J. Jiang, X. P. Chen. Security Architecture Research Based on Authentication Technology. Microelectronics & Computer, 22(4):8-11 (2005). [Google Scholar]
  2. L. Zhu. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. Manufacture Information Engineering of China, 8878(4):88782C-88782C-4 (2013). [Google Scholar]
  3. R. M. Abdul, D. Anandhavalli. Implementation of image based authentication to ensure the security of mail server. International Conference on Advanced Communication Control and Computing Technologies, 2015:555-558 (2015). [Google Scholar]
  4. P. Gope, T. Hwang. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks. IEEE Transactions on Industrial Electronics, 63(11):7124-7132 (2016). [CrossRef] [Google Scholar]
  5. J. Xiong, J. Zhu. Study on the Security of Network Database in Transmitting. Computer Science, 32(11):127-129 (2005). [Google Scholar]
  6. Y. Niu. User Authentication Protocol Based on Multi-Server Mutual Authentication. Computer Simulation, 33(2):350-354 (2016). [Google Scholar]
  7. X.Y. Hu. Remote Call and Manament of Users' Information of Unified Identity Authentication System. Journal of Xi'an Technological University, 35(9):715-719 (2015). [Google Scholar]
  8. X. Zhang, X.Y. Yang, S.S. Zhu. Trusted and anonymous authentication protocol for mobile networks. Journal of Computer Applications, 36(8):2231-2235 (2016). [Google Scholar]
  9. C.T. Li, C.C. Lee, C.Y. Weng. A dynamic identity-based user authentication scheme for remote login systems. Security & Communication Networks, 8(18):3372-3382 (2016). [Google Scholar]
  10. D.B. David, M. Rajappa, T. Karupuswamy, et al. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System. Wireless Personal Communications An International Journal, 85(1):241-261 (2015). [CrossRef] [Google Scholar]
  11. R. Amin, G.P. Biswas. A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. Journal of Medical Systems, 39(3):33 (2015). [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.