-
1
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: Get full text
Article -
2
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
3
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
4
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: Get full text
Article -
5
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
6
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
7
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: Get full text
Article -
8
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01Subjects: Get full text
Article -
9
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
10
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Subjects: Get full text
Article -
11
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: Get full text
Article -
12
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01Subjects: Get full text
Article -
13
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…duality and multi-level security model…”
Get full text
Article -
14
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01Subjects: Get full text
Article -
15
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: “…network information security model…”
Get full text
Article