Mimic defense authentication method for physical access control
To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobi...
Saved in:
Main Authors: | Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on distributed multi-access edge computing based on mimic defense theory
by: Hongyi ZHU, et al.
Published: (2019-09-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01)