共 50 条
- [1] The AVISPA tool for the automated validation of Internet security protocols and applications [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2005, 3576 : 281 - 285
- [2] Android vs. iOS Security: A Comparative Study [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 725 - 730
- [3] A comparative study of RFID solutions for security and privacy: POP vs. previous solutions [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 342 - 349
- [4] Comparative Study of Security Protocols to Enhance Security over Internet [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 552 - 556
- [5] Comparative study of xAPI validation tools [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
- [6] Cartesian vs. Radial - A Comparative Evaluation of Two Visualization Tools [J]. ADVANCES IN VISUAL COMPUTING, PT I, PROCEEDINGS, 2008, 5358 : 151 - 160
- [7] A Comparative Study: MongoDB vs. MySQL [J]. 2015 13TH INTERNATIONAL CONFERENCE ON ENGINEERING OF MODERN ELECTRIC SYSTEMS (EMES), 2015,
- [8] Eigenfaces vs. Fisherfaces vs. ICA for Face Recognition; A Comparative Study [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 914 - 919
- [9] Phone vs. Tangible in Museums: A Comparative Study [J]. PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,