-
1دورية أكاديمية
المؤلفون: Xie, Qi1 qixie68@126.com, Lu, Yanrong2, Tan, Xiao1, Tang, Zhixiong1, Hu, Bin1
المصدر: PLoS ONE. 10/5/2018, Vol. 13 Issue 10, p1-17. 17p.
مصطلحات موضوعية: *COMPUTER security, *COMPUTER access control, *KEY agreement protocols (Computer network protocols), *COMPUTER passwords, *CHAOS theory
-
2دورية أكاديمية
المؤلفون: Lu, Yanrong, Li, Lixiang, Peng, Haipeng, Yang, Yixian
المصدر: Wireless Personal Communications; Sep2017, Vol. 96 Issue 1, p813-832, 20p
مصطلحات موضوعية: WIRELESS sensor networks, DATA transmission systems, SMART cards, COMPUTER access control, KEY agreement protocols (Computer network protocols)
-
3دورية أكاديميةAn Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.
المؤلفون: Lu, Yanrong1,2, Li, Lixiang1,2 lixiang@bupt.edu.cn, Zhang, Hao1,2, Yang, Yixian1,2
المصدر: PLoS ONE. 4/21/2016, Vol. 11 Issue 4, p1-19. 19p.
مصطلحات موضوعية: *COMPUTER access control, *KEY agreement protocols (Computer network protocols), *CHAOS theory, *COMPUTER security, *CRYPTOGRAPHY, *APPLIED mathematics
-
4دورية أكاديمية
المؤلفون: Lu, Yanrong, Li, Lixiang, Peng, Haipeng, Yang, Yixian
المصدر: Peer-to-Peer Networking & Applications; Mar2016, Vol. 9 Issue 2, p449-459, 11p
مصطلحات موضوعية: SESSION Initiation Protocol (Computer network protocol), COMPUTER access control, ELLIPTIC curve cryptography, KEY agreement protocols (Computer network protocols), HTTP (Computer network protocol)
-
5دورية أكاديمية
المؤلفون: Lu, Yanrong, Li, Lixiang, Peng, Haipeng, Yang, Yixian
المصدر: Security & Communication Networks; Nov2015, Vol. 8 Issue 17, p3219-3228, 10p
مصطلحات موضوعية: BIOMETRIC identification cards, COMPUTER access control, SMART cards, BIOMETRIC identification, ACCESS control of computer networks
-
6دورية أكاديمية
المؤلفون: Lu, Yanrong1,2 luyanrong1985@163.com, Li, Lixiang1,2 li_lixiang2006@163.com, Yang, Yixian1,2 365257599@qq.com
المصدر: Mathematical Problems in Engineering. 4/7/2015, Vol. 2015, p1-9. 9p.
مصطلحات موضوعية: *SESSION Initiation Protocol (Computer network protocol), *ROBUST control, *COMPUTER access control, *CELLULAR signal transduction, *COMPUTER network security, *CYBERTERRORISM
-
7دورية أكاديمية
المؤلفون: Lu, Yanrong1,2 luyanrong1985@163.com, Li, Lixiang1,2 li_lixiang2006@163.com, Peng, Haipeng1,2 370560856@qq.com, Yang, Xing1,2 609518782@qq.com, Yang, Yixian1,2 365257599@qq.com
المصدر: International Journal of Distributed Sensor Networks. 3/4/2015, Vol. 2015, p1-9. 9p.
مصطلحات موضوعية: *KEY agreement protocols (Computer network protocols), *COMPUTER access control, *COMPUTER architecture, *ELECTRONIC authentication, *COMPUTER security, *DISTRIBUTED sensors