共 50 条
- [21] Security Analysis on Remote User Authentication Methods PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 506 - 513
- [24] Security analysis for authentication and authorisation in mobile phone PRZEGLAD ELEKTROTECHNICZNY, 2019, 95 (08): : 132 - 138
- [25] Security Analysis of ECC Based Authentication Protocols 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1167 - 1172
- [26] Security Analysis of Some RFID Authentication Protocols 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
- [27] Security Analysis of Robust User Authentication Protocol PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
- [28] VANET authentication protocols: security analysis and a proposal The Journal of Supercomputing, 2023, 79 : 2153 - 2179
- [29] Security Analysis of Authentication Overlaying Tag Signal WIRELESS INTERNET (WICON 2017), 2018, 230 : 173 - 180
- [30] The Security Analysis of Popular Instant Messaging Applications 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 1324 - 1328