-
1
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: Get full text
Article -
2
Protocol security enhancement on secondary system of smart substation
Published 2015-12-01Subjects: Get full text
Article -
3
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article -
4
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01Subjects: Get full text
Article