共 50 条
- [3] Correctness proofs for SCADA communication protocols [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 392 - 397
- [4] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
- [5] Protocols for Efficient Inference Communication [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2015, : 51 - 56
- [6] Passive attacks on a class of authentication protocols for RFID [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
- [7] POSTER: Inference Attacks against Searchable Encryption Protocols [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 845 - 847
- [8] Quantum Communication Attacks on Classical Cryptographic Protocols [J]. INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181
- [9] An Online Passive Testing Approach for Communication Protocols [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2014), 2014, : 136 - 143