-
1
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
2
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
3
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing;remote attestation;security protocol;CSP…”
Get full text
Article -
4
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
5
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
6
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
7
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
8
A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things
Published 2025-05-01Subjects: Get full text
Article -
9
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
10
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article -
11
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol;implementations security;Swift language;formal analysis;model extraction…”
Get full text
Article -
12
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
13
Rules of Engagement as an Example of a Security Protocol Constituting a “Code of Conduct” in Military Operations
Published 2024-12-01Subjects: Get full text
Article -
14
Rules of Engagement as an Example of a Security Protocol Constituting a “Code of Conduct” in Military Operations
Published 2024-12-01Subjects: Get full text
Article -
15
Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
Published 2024-11-01Subjects: Get full text
Article -
16
Solvability and Nilpotency of Lie Algebras in Cryptography and Steganography
Published 2025-05-01Subjects: Get full text
Article -
17
Security protocol of wireless sensor networks localization: analysis and performance
Published 2025-04-01Subjects: Get full text
Article -
18
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
19
Property-Based Testing for Cybersecurity: Towards Automated Validation of Security Protocols
Published 2025-05-01Subjects: Get full text
Article -
20
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article