-
1
Multi-language oriented automatic realization method for cryptographic protocols
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
2
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
3
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
4
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
5
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
6
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
7
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
8
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
9
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
10
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
11
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
12
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
13
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article -
14
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article -
15
Adjusted automata learning algorithm for security protocol adaptive model checking
Published 2015-11-01Subjects: “…security protocol…”
Get full text
Article -
16
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
17
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article -
18
Challenges and key technologies of new Ethernet for intelligent computing center
Published 2024-06-01Subjects: Get full text
Article -
19
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
20
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article