共 50 条
- [41] Automated design of security protocols CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
- [44] Comparison of wireless security protocols CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 94 - 99
- [45] On evaluating the performance of security protocols PARALLEL COMPUTING TECHNOLOGIES, 2005, 3606 : 1 - 15
- [46] Analyzing Internet security protocols SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
- [47] CryptoNET: Security Management Protocols ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2010, : 15 - 20
- [49] Uncovering attacks on security protocols Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575