-
1
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: “…authentication;anonymity;security analysis…”
Get full text
Article -
2
Design and realization of a high-speed traffic collection and processing scheme for campus networks using FPGA
Published 2024-11-01Subjects: Get full text
Article -
3
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
4
Application of security analysis technology for network big data
Published 2017-03-01Subjects: “…big data;security analysis;attack detection…”
Get full text
Article -
5
HMAC-Based Authentication Protocol: Attacks and Improvements
Published 2016-11-01Subjects: Get full text
Article -
6
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
7
Formal specification and security verification of usage control model based on PAT
Published 2016-03-01Subjects: Get full text
Article -
8
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
Published 2019-01-01Subjects: Get full text
Article -
9
Design and Realization of a Modeling Method in Security Analysis of Signal System
Published 2018-01-01Subjects: Get full text
Article -
10
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Published 2025-03-01Subjects: Get full text
Article -
11
Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication
Published 2025-04-01Subjects: Get full text
Article -
12
Implementation of MS Circle Map in Digital Image Encryption
Published 2025-06-01Subjects: Get full text
Article -
13
A Fuzzing Tool Based on Automated Grammar Detection
Published 2024-12-01Subjects: Get full text
Article -
14
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: “…security analysis…”
Get full text
Article -
15
Flow-based electronic resource network behavior analysis practice
Published 2024-11-01Subjects: Get full text
Article -
16
Multiple color images security by SPN over the residue classes of Gaussian integer $$\:Z{\left[i\right]}_{h}$$
Published 2025-02-01Subjects: Get full text
Article -
17
-
18
Device Independent Quantum Private Queries Based on Quantum Key Distribution
Published 2025-03-01Subjects: Get full text
Article -
19
Low power IoT device communication through hybrid AES-RSA encryption in MRA mode
Published 2025-04-01Subjects: Get full text
Article -
20
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01Subjects: Get full text
Article