Showing 1 - 6 results of 6 for search '"protocol security"', query time: 0.05s Refine Results
  1. 1
  2. 2

    Protocol security enhancement on secondary system of smart substation by Chen WANG, Zhipeng SHAO, Xiuli HUANG

    Published 2015-12-01
    Subjects: “…smart substation;secondary system;protocol security enhancement…”
    Get full text
    Article
  3. 3

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol;game theory;protocol security…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6