Deep search:Searching for "user authentication" in 'ABSTRACT and KEYWORDGot 3 items.
index Title
1A three-level authenticated conference key establishment protocol for UMTS networks
Author(s):Chung-Fu Lu, Tzong-Chen Wu, Chien-...  Clicked:3559  Download:1754  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.5 P.371-378  DOI:10.1631/jzus.C1000194
2An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Author(s):Rong FAN, Dao-jing HE, Xue-zeng PA...  Clicked:4820  Download:3147  Cited:17  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.7 P.550-560  DOI:10.1631/jzus.C1000377
3Fraud detection within bankcard enrollment on mobile device based payment using machine learning
Author(s):Hao Zhou, Hong-feng Chai, Mao-lin ...  Clicked:992  Download:643  Cited:0  <Full Text>  <PPT> 195
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1537-1545  DOI:10.1631/FITEE.1800580
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE