共 50 条
- [33] RFID Security Protocols [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
- [34] ON THE SECURITY OF RECENT PROTOCOLS [J]. INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 151 - 155
- [36] Enterprise strength security on a JXTA P2P network [J]. THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 7 - 8
- [37] Secure Dynamic Routing Protocols based on Cross-Layer Network Security Evaluation [J]. 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 303 - 308
- [38] An enhanced transport layer security protocol to support mutual platform-authentication protocols [J]. ICIC Express Lett., 9 (2369-2374):
- [39] An experimental study of cross-layer security protocols in public access wireless networks [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1747 - 1751
- [40] IoT Security: A review of vulnerabilities and security protocols [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520