-
1
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01Subjects: Get full text
Article -
2
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Subjects: Get full text
Article -
3
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
4
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01Subjects: Get full text
Article