CORC

浏览/检索结果: 共27条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Security and Efficient Authentication Scheme for Mobile Edge Computing 期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:  Xue, Jian-Bin;  Bai, Zi-Mei
收藏  |  浏览/下载:11/0  |  提交时间:2021/06/03
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:  Feng, Tao;  Wang, Shuaishuai;  Gong, Xiang;  Fang, Junli
收藏  |  浏览/下载:12/0  |  提交时间:2020/12/18
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model 期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:  Jie, Yingmo;  Choo, Kim-Kwang Raymond;  Li, Mingchu;  Chen, Ling;  Guo, Cheng
收藏  |  浏览/下载:21/0  |  提交时间:2019/12/02
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure 期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:  Da-Zhi Sun;  Yi Mu;  Willy Susilo
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/21
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure 期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 69
作者:  Da-Zhi Sun;  Yi Mu;  Willy Susilo
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/21
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure 期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 卷号: Vol.22 No.1, 页码: 69
作者:  
收藏  |  浏览/下载:5/0  |  提交时间:2019/11/21
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network 期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 卷号: 37, 页码: 112-121
作者:  Wu, Libing;  Wang, Jing;  Choo, Kim-Kwang Raymond;  Li, Yuangang;  He, Debiao
收藏  |  浏览/下载:5/0  |  提交时间:2019/08/22
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos 期刊论文
IEEE SECURITY & PRIVACY, 2017
Bai, Xiaolong; Xing, Luyi; Zhang, Nan; Wang, XiaoFeng; Liao, Xiaojing; Li, Tongxin; Hu, Shi-Min
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
HTTPAS: active authentication against HTTPS man-in-the-middle attacks 期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 页码: 2308-2314
作者:  Zhou, Peng[1];  Gu, Xiaojing[2]
收藏  |  浏览/下载:18/0  |  提交时间:2019/04/26
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol 期刊论文
Nonlinear Dynamics, 2014, 卷号: 78, 期号: 2, 页码: 1293-1300
Hu, Xuexian (1); Zhang, Zhenfeng (1)
收藏  |  浏览/下载:15/0  |  提交时间:2014/12/16


©版权所有 ©2017 CSpace - Powered by CSpace