-
1
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Subjects: “…security protocols…”
Get full text
Article -
2
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
3
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
4
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article -
5
-
6
Multi-language oriented automatic realization method for cryptographic protocols
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
7
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
8
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
9
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
10
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
11
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
12
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
13
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
14
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
15
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
16
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
17
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
18
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article -
19
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
20
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article