×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [4]
兰州理工大学 [4]
武汉大学 [4]
软件研究所 [4]
清华大学 [1]
厦门大学 [1]
更多...
内容类型
期刊论文 [11]
其他 [7]
会议论文 [6]
发表日期
2020 [1]
2019 [2]
2018 [1]
2017 [3]
2016 [1]
2014 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共24条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model
期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:
Jie, Yingmo
;
Choo, Kim-Kwang Raymond
;
Li, Mingchu
;
Chen, Ling
;
Guo, Cheng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Artificial intelligence
Losses
Network security
Pareto principle, Cyber security
Effective approaches
Game-theoretic model
Man in the middle attacks
Man-In-The-Middle (MITM) Attack
Pareto theory
Pareto-optimal
Stackelberg Games, Game theory
A Trusted Network Connect Protocol for Resisting Man-in-the-Middle Attack
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2019, 卷号: 42, 期号: 5
作者:
Zhao, Bo
;
Xiang, Cheng
;
Zhang, Huan-Guo
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:
Da-Zhi Sun
;
Yi Mu
;
Willy Susilo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/21
Bluetooth standard
Secure Simple Pairing
Passkey entry
Man
in
the
middle attack
Home network system
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
其他
2017-01-01
作者:
An, Rui
;
Feng, Hui
;
Liu, Qin
;
Li, Li
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
Radio-frequency identification
Authentication protocol
Elliptic curve cryptography
Man-in-the-middle attack
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
其他
2017-01-01
作者:
An, Rui
;
Feng, Hui
;
Liu, Qin
;
Li, Li
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Radio-frequency identification
Authentication protocol
Elliptic curve cryptography
Man-in-the-middle attack
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
其他
2017-01-01
作者:
An, Rui
;
Feng, Hui
;
Liu, Qin
;
Li, Li
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/05
Radio-frequency identification
Authentication protocol
Elliptic curve cryptography
Man-in-the-middle attack
基于Olive的大型网络管理训练平台设计与开发
期刊论文
2016, 2016
林海卓
;
王继龙
;
张程亮
;
LIN Hai-zhuo
;
WANG Ji-long
;
ZHANG Cheng-liang
收藏
  |  
浏览/下载:7/0
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
期刊论文
Nonlinear Dynamics, 2014, 卷号: 78, 期号: 2, 页码: 1293-1300
Hu, Xuexian (1)
;
Zhang, Zhenfeng (1)
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
Chaotic maps
Key exchange protocol
Anonymity
Man-in-the-middle attack
Implicit Encryption of Timing Packet with Statistical Side Channel Coding
会议论文
APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014-01-11
作者:
Zhu, Botao[1]
;
Liu, Xiaoxiao[2]
;
Huang, Jun Steed[3]
;
Chen, Zujue[4]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
Precision time protocol
Timing packet
Man in the middle Attack
Statistical side channel coding
©版权所有 ©2017 CSpace - Powered by
CSpace