CORC

浏览/检索结果: 共21条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States 期刊论文
IEEE ACCESS, 2019, 卷号: 7
作者:  Ji, Zhaoxu;  Zhang, Huanguo;  Wang, Houzhen
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A survey on secure routing protocols for satellite network 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 145
作者:  Yan, Yanjun;  Han, Guangjie;  Xu, Huihui
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Taxonomy and analysis of security protocols for Internet of Things 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: 89
作者:  Das, Ashok Kumar;  Zeadally, Sherali;  He, Debiao
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks 期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:  Wu Fusheng;  Zhang Huanguo
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Security Verification Analysis of Cryptographic Protocols Implementations on Real Code 期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2018, 卷号: 41, 期号: 2
作者:  Zhang, Huan-Guo;  Wu, Fu-Sheng;  Wang, Hou-Zhen;  Wang, Zhang-Yi
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols 期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:  Luo, Min;  Zhou, Xiaotong;  Li, Li;  Choo, Kim-Kwang Raymond;  He, Debiao
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography 期刊论文
COMPUTER NETWORKS, 2017, 卷号: 128
作者:  He, Debiao;  Zeadally, Sherali;  Wu, Libing;  Wang, Huaqun
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Formal Analysis of Information Card Federated Identity-Management Protocol 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2013, 卷号: 22, 期号: 1
作者:  Wang Juan;  Hu Hongxin;  Zhao Bo;  Yan Fei;  Zhang Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment 会议论文
作者:  Mao, Wenbo;  Yan, Fei;  Yi, Chuanjiang;  Chen, Haibo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Automatic Generation of Security Protocols Based on Evolutionary Algorithm 会议论文
作者:  Zhou, Yajie
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace