CORC

浏览/检索结果: 共24条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:  Feng, Tao;  Wang, Shuaishuai;  Gong, Xiang;  Fang, Junli
收藏  |  浏览/下载:12/0  |  提交时间:2020/12/18
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model 期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:  Jie, Yingmo;  Choo, Kim-Kwang Raymond;  Li, Mingchu;  Chen, Ling;  Guo, Cheng
收藏  |  浏览/下载:21/0  |  提交时间:2019/12/02
A Trusted Network Connect Protocol for Resisting Man-in-the-Middle Attack 期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2019, 卷号: 42, 期号: 5
作者:  Zhao, Bo;  Xiang, Cheng;  Zhang, Huan-Guo
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure 期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:  Da-Zhi Sun;  Yi Mu;  Willy Susilo
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/21
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/05
基于Olive的大型网络管理训练平台设计与开发 期刊论文
2016, 2016
林海卓; 王继龙; 张程亮; LIN Hai-zhuo; WANG Ji-long; ZHANG Cheng-liang
收藏  |  浏览/下载:7/0
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol 期刊论文
Nonlinear Dynamics, 2014, 卷号: 78, 期号: 2, 页码: 1293-1300
Hu, Xuexian (1); Zhang, Zhenfeng (1)
收藏  |  浏览/下载:15/0  |  提交时间:2014/12/16
Implicit Encryption of Timing Packet with Statistical Side Channel Coding 会议论文
APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014-01-11
作者:  Zhu, Botao[1];  Liu, Xiaoxiao[2];  Huang, Jun Steed[3];  Chen, Zujue[4]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24


©版权所有 ©2017 CSpace - Powered by CSpace