Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Symbols and descriptions.

More »

Table 1 Expand

Fig 1.

The overall identity authentication flowchart based on FAST-SM9 algorithm and zero-trust-DRA mechanism.

More »

Fig 1 Expand

Fig 2.

FMM and multi-layer security strategy diagram.

More »

Fig 2 Expand

Fig 3.

Key negotiation and session establishment diagram.

More »

Fig 3 Expand

Fig 4.

Display diagram of KEM + DEM session message processing mechanism.

More »

Fig 4 Expand

Fig 5.

Continuous message window authentication diagram.

More »

Fig 5 Expand

Table 2.

Comparison table of authentication delay.

More »

Table 2 Expand

Table 3.

Comparison table of authentication delay.

More »

Table 3 Expand

Table 4.

Comparison table of efficiency and safety.

More »

Table 4 Expand

Fig 6.

The AVISPA model diagram.

More »

Fig 6 Expand

Fig 7.

The simulation results of this method under OFMC and CL-AtSe conditions in AVISPA environment.

More »

Fig 7 Expand

Fig 8.

Comparison and analysis of various methods of security.

More »

Fig 8 Expand

Table 5.

Comparison of total communication costs.

More »

Table 5 Expand

Fig 9.

Comparison chart of communication overhead for various protocols.

More »

Fig 9 Expand