-
1
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
2
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
3
Design and realization of a high-speed traffic collection and processing scheme for campus networks using FPGA
Published 2024-11-01Subjects: Get full text
Article -
4
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
5
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
6
Formal specification and security verification of usage control model based on PAT
Published 2016-03-01Subjects: Get full text
Article -
7
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
8
An ownership transfer protocol for wearable devices
Published 2015-12-01Subjects: Get full text
Article -
9
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01Subjects: Get full text
Article -
10
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
11
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: “…security analysis…”
Get full text
Article -
12
Flow-based electronic resource network behavior analysis practice
Published 2024-11-01Subjects: Get full text
Article -
13
-
14
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01Subjects: Get full text
Article -
15
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01Subjects: Get full text
Article -
16
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01Subjects: Get full text
Article -
17
Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Published 2024-10-01Subjects: Get full text
Article -
18
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article -
19
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: Get full text
Article -
20
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article