1. Trang chủ
  2. » Luận Văn - Báo Cáo

Ứng dụng blockchain vaf merkle tree để tăng cường bảo mật dữ liệu trong mô hình xác thực dựa trên thuộc tính người dùng

122 147 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 122
Dung lượng 5,69 MB

Nội dung

Ngày đăng: 27/01/2021, 11:17

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[2] N. H. M. Alwi and Ip-Shing Fan, “Information security management in e- learning,” no. July 2015, pp. 1–6, 2014 Sách, tạp chí
Tiêu đề: Information security management in e-learning
[3] A. Moini and A. M. Madni, “Leveraging biometrics for user authentication in online learning: A systems perspective,” IEEE Systems Journal, vol. 3, no. 4, pp. 469–476, 2009 Sách, tạp chí
Tiêu đề: Leveraging biometrics for user authentication inonline learning: A systems perspective,” "IEEE Systems Journal
[4] M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004 Sách, tạp chí
Tiêu đề: A dynamic ID-based remote userauthentication scheme,” "IEEE Transactions on Consumer Electronics
[5] H. Jiang, “Strong password authentication protocols,” ICDLE 2010 - 2010 4th International Conference on Distance Learning and Education, Proceedings, pp. 50–52, 2010 Sách, tạp chí
Tiêu đề: Strong password authentication protocols,” "ICDLE 2010 - 2010 4thInternational Conference on Distance Learning and Education, Proceedings
[6] A. Almulhem, “A graphical password authentication system,” in 2011 World Congress on Internet Security (WorldCIS-2011), Feb 2011, pp. 223–225 Sách, tạp chí
Tiêu đề: A graphical password authentication system,” in "2011 WorldCongress on Internet Security (WorldCIS-2011)
[7] S. M. Gurav, L. S. Gawade, P. K. Rane, and N. R. Khochare, “Graphical password authentication: Cloud securing scheme,” in 2014 International Con- ference on Electronic Systems, Signal Processing and Computing Technologies, Jan 2014, pp. 479–483 Sách, tạp chí
Tiêu đề: Graphicalpassword authentication: Cloud securing scheme,” in "2014 International Con-ference on Electronic Systems, Signal Processing and Computing Technologies
[10] Z. Zheng, X. Liu, L. Yin, and Z. Liu, “A hybrid password authentication scheme based on shape and text,” Journal of Computers, vol. 5, no. 5, pp.765–772, 2010 Sách, tạp chí
Tiêu đề: A hybrid password authenticationscheme based on shape and text,” "Journal of Computers
[12] S. Schechter, A. J. Brush, and S. Egelman, “It’s no secret Measuring the security and reliability of authentication via ’secret’ questions,” Proceedings - IEEE Symposium on Security and Privacy, pp. 375–390, 2009 Sách, tạp chí
Tiêu đề: It’s no secret Measuring thesecurity and reliability of authentication via ’secret’ questions,” "Proceedings -IEEE Symposium on Security and Privacy
[13] F. Towhidi, A. A. Manaf, S. M. Daud, and A. H. Lashkari, “The Knowledge Based Authentication Attacks,” 2011 Sách, tạp chí
Tiêu đề: The KnowledgeBased Authentication Attacks
[14] K. Skraˇ ci´ c, P. Pale, and B. Jeren, “Knowledge based authentication require- ments,” in 2013 36th International Convention on Information and Commu- nication Technology, Electronics and Microelectronics (MIPRO), May 2013, pp. 1116–1120 Sách, tạp chí
Tiêu đề: Knowledge based authentication require-ments,” in "2013 36th International Convention on Information and Commu-nication Technology, Electronics and Microelectronics (MIPRO)
[15] K. Apampa, G. Wills, and D. Argles, “An approach to presence verification in summative e-assessment security,” Information Society (i-Society), pp.647–651, 2010 Sách, tạp chí
Tiêu đề: An approach to presence verificationin summative e-assessment security,” "Information Society (i-Society)
[16] A. A. Elwahab, A. M. Eldin, A. M. Wahba, and M. A. Sheirah, “A security layer for smart card applications authentication,” Proceedings - The 2009 International Conference on Computer Engineering and Systems, ICCES’09, pp. 514–517, 2009 Sách, tạp chí
Tiêu đề: A securitylayer for smart card applications authentication,” "Proceedings - The 2009International Conference on Computer Engineering and Systems, ICCES’09
[17] S. Ajay Kumar, K. Ashish, and G. Tarun, “Survey of Remote User Password Authentication Scheme Using Smart Cards,” International Journal of Advanced Research, vol. 3, no. 4, 2015 Sách, tạp chí
Tiêu đề: Survey of Remote User PasswordAuthentication Scheme Using Smart Cards,”"International Journal of AdvancedResearch
[18] A. G. Jadhao and S. P. Ugale, “Study of rfid authentication protocols,” in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Aug 2018, pp. 1–4 Sách, tạp chí
Tiêu đề: Study of rfid authentication protocols,” in"2018 Fourth International Conference on Computing Communication Controland Automation (ICCUBEA)
[19] P. D’Arco and A. Santis, “Weaknesses in a recent ultra-lightweight rfid au- thentication protocol,” vol. 5023, 06 2008, pp. 27–39 Sách, tạp chí
Tiêu đề: Weaknesses in a recent ultra-lightweight rfid au-thentication protocol
[20] S. Asha and C. Chellappan, “Authentication of e-learners using multimodal bometric technology,” IEEE- International Symposium on Biometrics and Security Technologies, ISBAST’08, 2008 Sách, tạp chí
Tiêu đề: Authentication of e-learners using multimodalbometric technology,” "IEEE- International Symposium on Biometrics andSecurity Technologies, ISBAST’08
[21] C. Gil, M. Castro, and M. Wyne, “Identification in web evaluation in learn- ing management system by fingerprint identification system,” Proceedings - Frontiers in Education Conference, FIE, pp. 1–6, 2010 Sách, tạp chí
Tiêu đề: Identification in web evaluation in learn-ing management system by fingerprint identification system,” "Proceedings -Frontiers in Education Conference, FIE
1–7, 2009. [Online]. Available: http://web.csulb.edu/{~}arezaei/ETEC551/web/LMS{_}fieldguide{_}20091.pdf Link
[52] Ethereum. (2018) Ethereum: White paper. [Online]. Available: https://github.com/ethereum/wiki/wiki/White-Paper Link
[54] ——. (2018) Introduction to smart contracts. [Online]. Available: https://solidity.readthedocs.io/en/v0.4.22/introduction-to-smart-contracts.html[55] Y. Chen, H. Li, K. Li, and J. Zhang, “An improved p2p file system scheme Link

TỪ KHÓA LIÊN QUAN

TRÍCH ĐOẠN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w