共 50 条
- [22] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network [J]. 2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
- [23] Two-round contributory group key exchange protocol for wireless network environments [J]. EURASIP Journal on Wireless Communications and Networking, 2011
- [24] Enhanced Modelling of Authenticated Key Exchange Security [J]. SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 36 - 52
- [26] An Security Algorithm for Wireless Sensor Network [J]. 2011 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE (ICMI 2011), PT 1, 2011, 3 : 96 - 101
- [27] Key Technologies of Wireless Heterogeneous Network Security [J]. ZTE Communications, 2008, (03) : 34 - 39
- [28] Universally composable security authenticated key exchange protocol [J]. Zhang, Zinan, 1600, Science Press (41):
- [29] Security analysis of a password authenticated key exchange protocol [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217