-
1
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: Get full text
Article -
2
Protocol security enhancement on secondary system of smart substation
Published 2015-12-01Subjects: “…smart substation;secondary system;protocol security enhancement…”
Get full text
Article -
3
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol;game theory;protocol security…”
Get full text
Article -
4
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
Published 2021-12-01Subjects: “…Denial-of-service, Routing protocol, Security, Wireless sensor network…”
Get full text
Article -
5
A Non-intrusive Method for Enhancing the Security of Modbus TCP Protocol Based on Cloud-Edge Collaboration in Distributed Resources
Published 2024-09-01Subjects: Get full text
Article -
6
SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction
Published 2025-08-01Subjects: Get full text
Article