Showing 1 - 20 results of 46 for search '"Security analysis"', query time: 0.13s Refine Results
  1. 1

    Security flaws and improvement to a wireless authentication protocol with anonymity by PENG Hua-xi, FENG Deng-guo

    Published 2006-01-01
    Subjects: “…authentication;anonymity;security analysis…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Application of security analysis technology for network big data by Laifu WANG, Huamin JIN, Dongxin LIU, Shuai WANG

    Published 2017-03-01
    Subjects: “…big data;security analysis;attack detection…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20