共 50 条
- [2] A simple process calculus for the analysis of security protocols [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
- [3] Bioinspired Security Analysis of Wireless Protocols [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
- [4] Bioinspired Security Analysis of Wireless Protocols [J]. Mobile Networks and Applications, 2016, 21 : 139 - 148
- [5] A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 232 - 239
- [6] Quantitative analysis of security protocols in wireless networks [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
- [7] Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols [J]. 2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2019,
- [8] PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2016, 8 (04): : 128 - 135
- [9] Analysis of Network Management Protocols in Wireless Sensor Network [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 546 - 549
- [10] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS [J]. CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97