Blood-Clot 发表于 2025-3-28 16:54:18
http://reply.papertrans.cn/87/8636/863517/863517_41.pnghazard 发表于 2025-3-28 20:33:41
978-3-031-30622-8ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2023cylinder 发表于 2025-3-29 02:57:29
http://reply.papertrans.cn/87/8636/863517/863517_43.png脱毛 发表于 2025-3-29 04:19:21
http://reply.papertrans.cn/87/8636/863517/863517_44.png毗邻 发表于 2025-3-29 10:31:19
http://reply.papertrans.cn/87/8636/863517/863517_45.pngIndelible 发表于 2025-3-29 14:14:51
http://reply.papertrans.cn/87/8636/863517/863517_46.pngExtricate 发表于 2025-3-29 17:06:43
http://reply.papertrans.cn/87/8636/863517/863517_47.pngPigeon 发表于 2025-3-29 20:37:08
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice are various security requirements need to meet, but also communication party is resource-constrained. Recently, a large number of 2PAKA schemes for IoT have been presented, yet most of them are subject to quantum attack. In this paper, we put forward a quantum-secure 2PAKA protocol using lattice cIngenuity 发表于 2025-3-30 03:21:46
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecturerivilege attack, dictionary guessing attack, and other attacks. To solve the above problems, this paper proposes an anonymous and practical multi-factor authentication protocol for mobile devices using two-server architecture with honeywords. The protocol is more secure than the existing single-fact不爱防注射 发表于 2025-3-30 06:15:46
http://reply.papertrans.cn/87/8636/863517/863517_50.png