-
1
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
2
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
3
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article -
4
Multi-language oriented automatic realization method for cryptographic protocols
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
5
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
6
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
7
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
8
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
9
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
10
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
11
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
12
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
13
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
14
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Subjects: “…security protocols…”
Get full text
Article -
15
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
16
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
17
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
18
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
19
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article -
20
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article