Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Mobile Terminal Identity Authentication Method Based on IBC

    With the rapid development of the power mobile Internet, traditional identity authentication and authentication modes still have identity information theft, are unable to prevent illegal behaviors of internal ...

    Xuqiu Chen, Wei Wang, Wei Gan, Yi Yang, Su Yuan in Smart Computing and Communication (2022)

  2. No Access

    Chapter and Conference Paper

    Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm

    In order to meet the higher security requirements of authentication technology under the current mobile Internet background, continuous identity authentication technology based on single authentication improve...

    Wei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu in Artificial Intelligence and Security (2022)

  3. No Access

    Chapter and Conference Paper

    Research on Network Security Situation Assessment Model Based on Double AHP

    Network security situation assessment is an important part of the situational awareness research process and the most important thing. Situation assessment refers to the assessment of the current security stat...

    Wei Wang, Xuqiu Chen, Wei Gan, Yi Yang in Advances in Artificial Intelligence and Se… (2022)