-
21
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Subjects: “…security protocols…”
Get full text
Article -
22
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
23
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
24
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article -
25
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article -
26