×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
北京大学 [4]
软件研究所 [4]
天津大学 [3]
清华大学 [2]
西安交通大学 [2]
更多...
内容类型
期刊论文 [17]
会议论文 [7]
其他 [3]
发表日期
2021 [1]
2020 [1]
2019 [1]
2018 [3]
2017 [2]
2016 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共27条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model
期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:
Jie, Yingmo
;
Choo, Kim-Kwang Raymond
;
Li, Mingchu
;
Chen, Ling
;
Guo, Cheng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Artificial intelligence
Losses
Network security
Pareto principle, Cyber security
Effective approaches
Game-theoretic model
Man in the middle attacks
Man-In-The-Middle (MITM) Attack
Pareto theory
Pareto-optimal
Stackelberg Games, Game theory
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:
Da-Zhi Sun
;
Yi Mu
;
Willy Susilo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/21
Bluetooth standard
Secure Simple Pairing
Passkey entry
Man
in
the
middle attack
Home network system
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 69
作者:
Da-Zhi Sun
;
Yi Mu
;
Willy Susilo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/21
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 卷号: Vol.22 No.1, 页码: 69
作者:
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/21
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 卷号: 37, 页码: 112-121
作者:
Wu, Libing
;
Wang, Jing
;
Choo, Kim-Kwang Raymond
;
Li, Yuangang
;
He, Debiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
Ad hoc network
Mutual authentication
Non-repudiation
IBE
Bilinear pairings
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos
期刊论文
IEEE SECURITY & PRIVACY, 2017
Bai, Xiaolong
;
Xing, Luyi
;
Zhang, Nan
;
Wang, XiaoFeng
;
Liao, Xiaojing
;
Li, Tongxin
;
Hu, Shi-Min
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
HTTPAS: active authentication against HTTPS man-in-the-middle attacks
期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 页码: 2308-2314
作者:
Zhou, Peng[1]
;
Gu, Xiaojing[2]
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/04/26
transport protocols
hypermedia
cryptographic protocols
Internet
HTTPAS
active authentication architecture
HTTPS man-in-the-middle attacks
hypertext transfer protocol secure
pre-trusted certificate authorities
CAs
notary-based systems
pre-shared secrets
openSSL suite
Internet path diversity
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
期刊论文
Nonlinear Dynamics, 2014, 卷号: 78, 期号: 2, 页码: 1293-1300
Hu, Xuexian (1)
;
Zhang, Zhenfeng (1)
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
Chaotic maps
Key exchange protocol
Anonymity
Man-in-the-middle attack
©版权所有 ©2017 CSpace - Powered by
CSpace