梦见钱是什么意思| 酒店尾房是什么意思| 罡什么意思| guava是什么水果| 行动派是什么意思| 酉时是什么时候| 肺实性结节是什么意思| 葡萄是什么茎| 多囊卵巢综合症是什么原因造成的| 例假期间吃什么减肥| 两规是什么意思| 咽炎要注意什么饮食| 骨感是什么意思| 梦见炒菜是什么意思| 什么是手卫生| 动脉硬化是什么症状| 暑假什么时候放| 马到成功是什么生肖| 浇花的水壶叫什么| 胃酸吃什么| 啤酒加鸡蛋有什么功效| 皮肤癣是什么原因造成的| 糖料病者应吃什么好| ys是什么意思| 陶渊明是什么朝代的| 大疱性皮肤病是什么病| vans是什么牌子| na什么意思| 人乳头瘤病毒39型阳性是什么意思| 知了为什么要叫| yy是什么| 提报是什么意思| 更年期失眠吃什么药效果好| 吃鹅蛋对孕妇有什么好处| 血压什么时候量最准确| 喝什么茶降血脂| 霉菌有什么症状| 特应性皮炎用什么药膏| 政客是什么意思| rj什么意思| 胆五行属什么| 空调健康模式是什么意思| 人体缺甲是什么症状| 什么东西能去脸上的斑| epa是什么营养物质| 湿气太重吃什么药最好| 持续高烧不退是什么原因| 湿化瓶内放什么水| 胰腺炎吃什么好| 消石灰是什么| 邮箱抄送是什么意思| 天麻泡水喝有什么功效| fe是什么元素| 内务是什么意思| 升是什么意思| 平衡液又叫什么名字| 云南白药的保险子是起什么作用的| 果脯是什么东西| 云的五行属性是什么| 安宫牛黄丸适合什么人群吃| 臀推是什么意思| 面面俱到是什么意思| 紫癜有什么症状| 11月2日是什么星座| 脑血管堵塞吃什么药最好| 什么是不动产权证| 刘备是个什么样的人| 什么是粳米| 鼓风机是干什么用的| 杉字五行属什么| 求欢是什么意思| 宫腔镜是什么检查| 6月23号是什么日子| 啸是什么生肖| 男人头发硬说明什么| 圣罗兰属于什么档次| cbg是什么意思| 红花泡脚有什么好处| 手淫导致的阳痿早泄吃什么药| 宫颈息肉不切除有什么危害| 经常做春梦是什么原因| aww是什么意思| 胃经常胀气是什么原因| 今年25岁属什么生肖的| 洁面慕斯和洗面奶有什么区别| 夏天可以种什么花| 6月26日是什么星座| 什么是重心| 血型b型rh阳性是什么意思| 心火是什么原因引起的| 老年人吃什么钙片好| 硬度不够吃什么好| 尿毒症能吃什么水果| 被臭虫咬了擦什么药| 儿童咳嗽吃什么药| 福字挂在家里什么位置最合适| 桥本是什么| 一毛不拔是什么动物| 女人最想要什么| 为什么屎是黑色的| 小孩肠胃感冒吃什么药| 狗翻肠子什么症状| 恩字五行属什么| 波子是什么车| 喝什么| 曹操是什么样的人| 经常掉头发是什么原因| 嵌合体是什么意思| 11月15日出生是什么星座| 1948年是什么年| 维生素h的作用及功能主治是什么| 六月二十六是什么日子| 右乳导管扩张什么意思| 咳喘是什么原因| 吃饭睡觉打豆豆是什么意思| 惯犯是什么意思| 金刚是什么意思| 变色龙形容什么样的人| 腾字五行属什么| 姓什么的人最多| 幽门螺旋杆菌的症状吃什么药| 六月十二日是什么日子| 食伤泄秀是什么意思| 女左上眼皮跳是什么预兆| 老年人贫血吃什么补血最快最有效| 破处是什么意思| 艾灸肚脐有什么好处| 胸口容易出汗是什么原因| 娘子啊哈是什么歌| 木节念什么| 水漫金山是什么意思| 仿水晶是什么材质| 海为什么是蓝色的| xyz是什么意思| zoe是什么意思| 血压低压高吃什么药| 南昌有什么好玩的地方| 鼻子疼是什么原因| 五行中金代表什么| 痣为什么会越来越多| 相中是什么意思| 拔牙后吃什么恢复快| 伊朗是什么派| 空气炸锅可以做什么| 人为什么需要诗歌| 尿有泡泡是什么病| 赵本山什么学历| 普洱茶属于什么茶类| 血压低压高吃什么药| 渐冻症是什么病| 夏天可以种什么蔬菜| 老是感冒是什么原因| 慢性结膜炎用什么眼药水| 流鼻涕是什么原因| 子宫内膜6mm意味着什么| 相伴是什么意思| 神经外科治疗什么病| 糖尿病人吃什么好| 履约是什么意思| 尿频尿急尿不尽挂什么科| 胃酸胃胀吃什么药| 为什么会血热| 翰字五行属什么| 父母是o型血孩子是什么血型| 盐冻虾是什么意思| 腰间盘突出睡觉什么姿势好| 爱出汗是什么原因女人| 喉咙里的小肉球叫什么| 什么是浸润性乳腺癌| q10什么时候吃最好| 蛇鼠一窝是什么生肖| 1940年中国发生了什么| 男人吃什么容易生儿子| 有白带发黄是什么原因| 旱魃是什么| 甲状腺实性结节什么意思| 辅酶q10什么价格| 为什么肠道总是咕咕的响| 棕色皮鞋配什么颜色裤子| 失温是什么意思| 星期狗什么意思| loveyourself什么意思| 胆固醇高会引起什么病| 什么叫腺肌瘤| 3月16号是什么星座| 自身免疫性肝病是什么意思| 样本是什么意思| 肛门痒挂什么科| supreme是什么牌子| 草果在炖肉起什么作用| 糖尿病人可以吃什么| 梦见老牛是什么意思| 6月21号什么星座| 什么是黑色素瘤| 矽肺病是什么症状| 眼带用什么方法消除| 驱动精灵是干什么用的| 2008年是什么年| 扶乩是什么意思| 指甲缝疼是什么原因| 拉倒吧是什么意思| 左手指头麻木是什么原因| 什么牌子的蓝牙耳机好| 杨梅吃了有什么好处| 手指尖麻木是什么原因| 性格好的女生是什么样| 妈祖是什么| 狗狗能看见什么颜色| 焦糖是什么糖| 为什么经常刷牙还牙黄| 男性尿道痒吃什么药| 你什么都可以| 乳痈是什么意思| 紫菜和海带有什么区别| 六月六是什么节| 炒什么菜适合拌面| 梦见鬼是什么预兆| 生意兴隆是什么意思| 垫底是什么意思| 雌二醇凝胶有什么作用| 背动态心电图要注意什么| 相向而行什么意思| 英短蓝猫吃什么猫粮好| 929是什么星座| 小孩肠胃感冒吃什么药比较好| 男性尿很黄是什么原因| 负罪感是什么意思| 什么照镜子里外不是人| 决定的近义词是什么| 戊肝阳性是什么意思| 漏尿是什么原因造成的| 扁桃体发炎是什么原因引起的| 什么是黄色视频| 月经来了头疼是什么原因导致的| 可可是什么饮料| 小暑是什么时候| 什么是地包天牙齿图片| 贫血会引起什么症状| 女性支原体感染有什么症状| 18岁是什么年华| 肾结石有什么症状表现| 马拉松起源与什么有关| 花椒什么时候成熟| 有机磷是什么| 秋天的落叶像什么| 信手拈来是什么意思| 什么什么为什么| 食道炎用什么药最好| 买什么样的老花镜好| 舒肝解郁胶囊治什么病| 伦字五行属什么| 机智如你是什么意思| 白色车里放什么摆件好| lb是什么| 九七年属什么生肖| 卵泡不破是什么原因造成的| 血脂血糖高吃什么食物好| 喝完酒吃什么解酒最快| 早醒是什么原因造成的| 骨挫伤是什么意思| 流黄鼻涕是什么感冒| 梦见桥断了有什么预兆| 榴莲对孕妇有什么好处| 口腔溃疡缺少什么维生素| 百度Jump to content

中国城市综合发展指标出炉:京沪深综合排名前三

From Wikipedia, the free encyclopedia
百度 京津冀空气好转人努力超8成近几年空气质量大幅好转,几分靠天,几分靠人?对此,国家大气污染防治攻关联合中心副主任、中国工程院院士贺克斌介绍,北京2017年的年均浓度降到58微克/立方米,2017年的气象条件做出了有力贡献。

Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security.[1][2] Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates.

Mutual authentication is often employed in the Internet of Things (IoT). Writing effective security schemes in IoT systems is challenging, especially when schemes are desired to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks,[3] which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes.[4]

Process steps and verification

[edit]

Schemes that have a mutual authentication step may use different methods of encryption, communication, and verification, but they all share one thing in common: each entity involved in the communication is verified. If Alice wants to communicate with Bob, they will both authenticate the other and verify that it is who they are expecting to communicate with before any data or messages are transmitted. A mutual authentication process that exchanges user IDs may be implemented as follows:[citation needed]

  1. Alice sends a message encrypted with Bob's public key to Bob to show that Alice is a valid user.
  2. Bob verifies the message:
    1. Bob checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
    2. The message is then decrypted with Bob's secret key, giving Alice's ID.
      1. Bob checks if the message matches a valid user. If not, the session is aborted.
  3. Bob sends Alice a message back to show that Bob is a valid user.
  4. Alice verifies the message:
    1. Alice checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
    2. The message is then decrypted with Alice's secret key, giving Bob's ID.
      1. Alice checks if the message matches a valid user. If not, the session is aborted.
  5. At this point, both parties are verified to be who they claim to be and safe for the other to communicate with. Lastly, Alice and Bob will create a shared secret key so that they can continue communicating in a secure manner.

To verify that mutual authentication has occurred successfully, Burrows-Abadi-Needham logic (BAN logic) is a well regarded and widely accepted method to use, because it verifies that a message came from a trustworthy entity. BAN logic first assumes an entity is not to be trusted, and then will verify its legality.[1][2][5][6]

Defenses

[edit]

Mutual authentication supports zero trust networking because it can protect communications against adversarial attacks,[7] notably:

Man-in-the-middle attack
Man-in-the-middle (MITM) attacks are when a third party wishes to eavesdrop or intercept a message, and sometimes alter the intended message for the recipient. The two parties openly receive messages without verifying the sender, so they do not realize an adversary has inserted themselves into the communication line. Mutual authentication can prevent MITM attacks because both the sender and recipient verify each other before sending them their message keys, so if one of the parties is not verified to be who they claim they are, the session will end.[8]
Replay attack
A replay attack is similar to a MITM attack in which older messages are replayed out of context to fool the server. However, this does not work against schemes using mutual authentication[9] because timestamps are a verification factor that are used in the protocols.[10][11] If the change in time is greater than the maximum allowed time delay, the session will be aborted.[11] Similarly, messages can include a randomly generated number to keep track of when a message was sent.[10]
Spoofing attack
Spoofing attacks rely on using false data to pose as another user in order to gain access to a server or be identified as someone else. Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and access.[11]
Impersonation attacks
Impersonation attacks refer to malicious attacks where a user or individual pretends to be an authorized user to gain unauthorized access to a system while feigning permission.[12] When each party authenticates the other, they send each other a certificate that only the other party knows how to unscramble, verifying themselves as a trusted source. In this way, adversaries cannot use impersonation attacks because they do not have the correct certificate to act as if they are the other party.[5]

Mutual authentication also ensures information integrity because if the parties are verified to be the correct source, then the information received is reliable as well.[5]

mTLS

[edit]

By default the TLS protocol only proves the identity of the server to the client using X.509 certificates, and the authentication of the client to the server is left to the application layer. TLS also offers client-to-server authentication using client-side X.509 authentication.[13] As it requires provisioning of the certificates to the clients and involves a less user-friendly experience, it is rarely used in end-user applications.

Mutual TLS authentication (mTLS) is more often used in business-to-business (B2B) applications, where a limited number of programmatic and homogeneous clients are connecting to specific web services, the operational burden is limited, and security requirements are usually much higher as compared to consumer environments.

mTLS is also used in microservices-based applications based on runtimes such as Dapr, via systems like SPIFFE.[7]

Lightweight schemes vs. secured schemes

[edit]

While lightweight schemes and secure schemes are not mutually exclusive, adding a mutual authentication step to data transmissions protocols can often increase performance runtime and computational costs.[2] This can become an issue for network systems that cannot handle large amounts of data or those that constantly have to update for new real-time data (e.g. location tracking, real-time health data).[2][9]

Thus, it becomes a desired characteristic of many mutual authentication schemes to have lightweight properties (e.g. have a low memory footprint) in order to accommodate the system that is storing a lot of data.[3] Many systems implement cloud computing, which allows quick access to large amounts of data, but sometimes large amounts of data can slow down communication. Even with edge-based cloud computing, which is faster than general cloud computing due to a closer proximity between the server and user,[5] lightweight schemes allow for more speed when managing larger amounts of data. One solution to keep schemes lightweight during the mutual authentication process is to limit the number of bits used during communication.[3]

Applications that solely rely on device-to-device (D2D) communication, where multiple devices can communicate locally in close proximities, removes the third party network. This in turn can speed up communication time.[14] However, the authentication still occurs through insecure channels, so researchers believe it is still important to ensure mutual authentication occurs in order to keep a secure scheme.[14]

Schemes may sacrifice a better runtime or storage cost when ensuring mutual authentication in order to prioritize protecting the sensitive data.[2][11]

Password-based schemes

[edit]

In mutual authentication schemes that require a user's input password as part of the verification process, there is a higher vulnerability to hackers because the password is human-made rather than a computer-generated certificate. While applications could simply require users to use a computer-generated password, it is inconvenient for people to remember. User-made passwords and the ability to change one's password are important for making an application user-friendly,[15] so many schemes work to accommodate the characteristic. Researchers note that a password based protocol with mutual authentication is important because user identities and passwords are still protected, as the messages are only readable to the two parties involved.[16]

However, a negative aspect about password-based authentication is that password tables can take up a lot of memory space.[15] One way around using a lot of memory during a password-based authentication scheme is to implement one-time passwords (OTP), which is a password sent to the user via SMS or email. OTPs are time-sensitive, which means that they will expire after a certain amount of time and that memory does not need to be stored.[17]

Multi-factor authentication

[edit]

Recently, more schemes have higher level authentication than password based schemes. While password-based authentication is considered as "single-factor authentication," schemes are beginning to implement smart card (two-factor)[15] or biometric-based (three-factor) authentication schemes. Smart cards are simpler to implement and easy for authentication, but still have risks of being tampered with.[15] Biometrics have grown more popular over password-based schemes because it is more difficult to copy or guess session keys when using biometrics,[6] but it can be difficult to encrypt noisy data.[17] Due to these security risks and limitations, schemes can still employ mutual authentication regardless of how many authentication factors are added.[6]

Certificate based schemes and system applications

[edit]

Mutual authentication is often found in schemes employed in the Internet of Things (IoT), where physical objects are incorporated into the Internet and can communicate via IP address.[10] Authentication schemes can be applied to many types of systems that involve data transmission.[14] As the Internet's presence in mechanical systems increases, writing effective security schemes for large numbers of users, objects, and servers can become challenging, especially when needing schemes to be lightweight and have low computational costs. Instead of password-based authentication, devices will use certificates to verify each other's identities.

Radio networks

[edit]

Mutual authentication can be satisfied in radio network schemes, where data transmissions through radio frequencies are secure after verifying the sender and receiver.[11][18]

Radio frequency identification (RFID) tags are commonly used for object detection, which many manufacturers are implementing into their warehouse systems for automation.[19] This allows for a faster way to keep up with inventory and track objects. However, keeping track of items in a system with RFID tags that transmit data to a cloud server increases the chances of security risks, as there are now more digital elements to keep track of.[19] A three way mutual authentication can occur between RFID tags, the tag readers, and the cloud network that stores this data in order to keep RFID tag data secure and unable to be manipulated.[19]

Similarly, an alternate RFID tag and reader system that assigns designated readers to tags has been proposed for extra security and low memory cost.[20] Instead of considering all tag readers as one entity, only certain readers can read specific tags. With this method, if a reader is breached, it will not affect the whole system. Individual readers will communicate with specific tags during mutual authentication, which runs in constant time as readers use the same private key for the authentication process.

Many e-Healthcare systems that remotely monitor patient health data use wireless body area networks (WBAN) that transmit data through radio frequencies.[11] This is beneficial for patients that should not be disturbed while being monitored, and can reduced the workload for medical worker and allow them to focus on the more hands-on jobs. However, a large concern for healthcare providers and patients about using remote health data tracking is that sensitive patient data is being transmitted through unsecured channels,[8] so authentication occurs between the medical body area network user (the patient), the Healthcare Service Provider (HSP) and the trusted third party.

Cloud based computing

[edit]

e-Healthcare clouds are another way to store patient data collected remotely.[2] Clouds are useful for storing large amounts of data, such as medical information, that can be accessed by many devices whenever needed. Telecare Medical Information Systems (TMIS), an important way for medical patients to receive healthcare remotely, can ensure secured data with mutual authentication verification schemes.[14] Blockchain is one way that has been proposed to mutually authenticate the user to the database, by authenticating with the main mediBchain node and keeping patient anonymity.[21]

Fog-cloud computing is a networking system that can handle large amounts of data, but still has limitations regarding computational and memory cost.[22] Mobile edge computing (MEC) is considered to be an improved, more lightweight fog-cloud computing networking system,[22] and can be used for medical technology that also revolves around location-based data. Due to the large physical range required of locational tracking, 5G networks can send data to the edge of the cloud to store data. An application like smart watches that track patient health data can be used to call the nearest hospital if the patient shows a negative change in vitals.[5]

Fog node networks can be implemented in car automation, keeping data about the car and its surrounding states secure. By authenticating the fog nodes and the vehicle, vehicular handoff becomes a safe process and the car’s system is safe from hackers.[9]

Machine to machine verification

[edit]

Many systems that do not require a human user as part of the system also have protocols that mutually authenticate between parties. In unmanned aerial vehicle (UAV) systems, a platform authentication occurs rather than user authentication.[2] Mutual authentication during vehicle communication prevents one vehicle's system from being breached, which can then affect the whole system negatively. For example, a system of drones can be employed for agriculture work and cargo delivery, but if one drone were to be breached, the whole system has the potential to collapse.[2]

[edit]

References

[edit]
  1. ^ a b Chen, Yulei; Chen, Jianhua (2020). "A secure three-factor-based authentication with key agreement protocol for e-Health clouds". The Journal of Supercomputing. 77 (4): 3359–3380. doi:10.1007/s11227-020-03395-8. ISSN 0920-8542. S2CID 221146362.
  2. ^ a b c d e f g h Chen, Liquan; Qian, Sijie; Lim, Ming; Wang, Shihui (2018). "An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems". China Communications. 15 (5): 61–76. doi:10.1109/CC.2018.8387987. S2CID 49333360.
  3. ^ a b c Jan, Mian Ahmad; Khan, Fazlullah; Alam, Muhammad; Usman, Muhammad (2019). "A payload-based mutual authentication scheme for Internet of Things". Future Generation Computer Systems. 92: 1028–1039. doi:10.1016/j.future.2017.08.035. hdl:10453/117906. S2CID 57380203.
  4. ^ Amin, Ruhul; Islam, SK Hafizul; Vijayakumar, Pandi; Khan, Muhammad Khurram; Chang, Victor (2018). "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication". Multimedia Tools and Applications. 77 (9): 11041–11066. doi:10.1007/s11042-017-4996-z. S2CID 13674284.
  5. ^ a b c d e Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020). "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing". Wireless Personal Communications. 113: 575–598. doi:10.1007/s11277-020-07240-2. S2CID 218934756.
  6. ^ a b c Sahoo, Shreeya Swagatika; Mohanty, Sujata; Majhi, Banshidhar (2020). "Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC". Wireless Personal Communications. 111 (2): 991–1017. doi:10.1007/s11277-019-06897-8. S2CID 208125038.
  7. ^ a b "Mutual TLS: Securing Microservices in Service Mesh". The New Stack. 2025-08-05. Retrieved 2025-08-05.
  8. ^ a b Sasikaladevi, N.; Malathi, D. (2019). "Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve". Wireless Personal Communications. 109 (4): 2471–2488. doi:10.1007/s11277-019-06693-4. S2CID 204084523.
  9. ^ a b c Dewanta, Favian; Mambo, Masahiro (2019). "A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment". IEEE Access. 7: 103095–103114. Bibcode:2019IEEEA...7j3095D. doi:10.1109/ACCESS.2019.2931217. S2CID 199509951.
  10. ^ a b c Melki, Reem; Noura, Hassan N.; Chehab, Ali (2020). "Lightweight multi-factor mutual authentication protocol for IoT devices". International Journal of Information Security. 19 (6): 679–694. doi:10.1007/s10207-019-00484-5. S2CID 209340123.
  11. ^ a b c d e f Narwal, Bhawna; Mohapatra, Amar Kumar (2020). "SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks". Wireless Personal Communications. 113 (4): 1985–2008. doi:10.1007/s11277-020-07304-3. S2CID 216529906.
  12. ^ Moallem, Abbas, ed. (2021). HCI for Cybersecurity, Privacy and Trust. Lecture Notes in Computer Science. Vol. 12788. doi:10.1007/978-3-030-77392-2. ISBN 978-3-030-77391-5. ISSN 0302-9743.
  13. ^ Dierks, Tim (August 2008). "The Transport Layer Security (TLS) Protocol Version 1.2". tools.ietf.org. Retrieved 2025-08-05.
  14. ^ a b c d g. Lopes, Ana Paula; Gondim, Paulo R. L. (2020). "Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System". Sensors. 20 (7): 2072. Bibcode:2020Senso..20.2072G. doi:10.3390/s20072072. PMC 7181216. PMID 32272675.
  15. ^ a b c d Karuppiah, Marimuthu; Saravanan, R. (2015). "Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards". Journal of Discrete Mathematical Sciences and Cryptography. 18 (5): 623–649. doi:10.1080/09720529.2015.1013693. S2CID 62591965.
  16. ^ Karuppiah, Marimuthu; Das, Ashok Kumar; Li, Xiong; Kumari, Saru; Wu, Fan; Chaudhry, Shehzad Ashraf; Niranchana, R. (2019). "Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment". Mobile Networks and Applications. 24 (3): 1046–1062. doi:10.1007/s11036-018-1061-8. S2CID 64720667.
  17. ^ a b Sharma, Mohit Kr; Nene, Manisha J. (2020). "Two-factor authentication using biometric based quantum operations". Security and Privacy. 3 (3). doi:10.1002/spy2.102.
  18. ^ Choudhary, Karanjeet; Gaba, Gurjot Singh; Butun, Ismail; Kumar, Pardeep (2020). "MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things". Sensors. 20 (18): 5166. Bibcode:2020Senso..20.5166C. doi:10.3390/s20185166. PMC 7570918. PMID 32927788.
  19. ^ a b c Anandhi, S.; Anitha, R.; Sureshkumar, Venkatasamy (2020). "An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment". Wireless Personal Communications. 113 (4): 2339–2361. doi:10.1007/s11277-020-07330-1. S2CID 219070999.
  20. ^ Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay (2017). "Privacy-Preserving Mutual Authentication in RFID with Designated Readers". Wireless Personal Communications. 96 (3): 4819–4845. doi:10.1007/s11277-017-4430-x. S2CID 207264759.
  21. ^ Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019). "MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture". IEEE Access. 7: 149282–149298. Bibcode:2019IEEEA...7n9282L. doi:10.1109/ACCESS.2019.2947313. S2CID 204863294.
  22. ^ a b Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019). "NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture". Journal of Medical Systems. 43 (10): 318. doi:10.1007/s10916-019-1444-9. PMID 31522286. S2CID 202570185.
pnh是什么病的简称 牡丹王是什么茶 餐饮行业五行属什么 如饥似渴是什么意思 痛风该吃什么药好得快
下眼睑红肿是什么原因 臭酸是什么 痛风不能吃什么 开店做什么生意好 颈椎病睡什么枕头最好
明前茶和明后茶有什么区别 什么实实 补体c1q偏低说明什么 尿碘是检查什么的 长痘吃什么水果好
吃维生素c和维生素e有什么好处 mango是什么意思 ct和b超有什么区别 三楼属于五行属什么 肝火旺吃什么中药
提拉米苏是什么xinjiangjialails.com 过敏应该挂什么科hcv8jop2ns4r.cn nlp是什么hcv8jop2ns3r.cn 6.19是什么日子hcv8jop0ns6r.cn 飞蚊症吃什么药hcv9jop6ns4r.cn
玄是什么颜色bfb118.com 癣用什么药膏hcv8jop7ns5r.cn 儿童登机需要什么证件hcv8jop9ns9r.cn 梦见订婚是什么意思hcv9jop0ns6r.cn 纤维素纤维是什么面料hcv9jop1ns2r.cn
什么叫阴虚什么叫阳虚adwl56.com 胃酸吃什么食物好hcv8jop2ns1r.cn ctc是什么意思hcv8jop1ns6r.cn 长沙有什么景点hcv9jop5ns3r.cn 阴道炎要用什么药hcv7jop5ns1r.cn
下一个台风什么时候来kuyehao.com 孕妇梦见好多蛇是什么预兆hcv8jop5ns9r.cn 孽缘什么意思hcv9jop8ns2r.cn 波罗蜜多什么意思hcv8jop1ns7r.cn 消化性溃疡吃什么药好hcv8jop7ns2r.cn
百度