共 50 条
- [1] Running-mode analysis of the Lu-Smolka-SET protocol EEE '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, E-GOVERNMENT, AND OUTSOURCING, 2005, : 151 - 157
- [2] The running-mode analysis of two-party optimistic fair exchange protocols COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 137 - 142
- [3] Analysis of the SSL 3.0 protocol PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 29 - 40
- [4] Security Analysis and Configuration of SSL Protocol 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 216 - +
- [5] SSL Protocol Analysis Based on Freshness Identifiers PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, 2016, 43 : 26 - 31
- [6] Analysis and Comparison of Several algorithms in SSL/TLS Handshake Protocol ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 613 - +
- [7] Performance Analysis of the Novel SSL Based UMTS Authentication Protocol ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1660 - +
- [8] Applying RBF algorithm in SSL protocol PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2021 - 2029