-
1
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
2
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
3
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: Get full text
Article -
4
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
5
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
6
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: Get full text
Article -
7
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01Subjects: Get full text
Article -
8
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
9
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Subjects: Get full text
Article -
10
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: Get full text
Article -
11
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01Subjects: Get full text
Article -
12
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…duality and multi-level security model…”
Get full text
Article -
13
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01Subjects: Get full text
Article -
14
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: “…network information security model…”
Get full text
Article -
15
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: Get full text
Article