共 50 条
- [41] Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1999, : 216 - 231
- [42] Key Agreement and Authentication Protocols in the Internet of Things: A Survey APPLIED SCIENCES-BASEL, 2023, 13 (01):
- [44] Internet of Things Authentication Protocols: Comparative Study CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 65 - 91
- [46] Secure deniable authenticated key establishment for Internet Protocols PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 3 - +
- [47] Profiles and protocols for the Internet Public-Key Infrastructure PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 220 - 224
- [50] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123