共 50 条
- [44] The efficiency and security of a real quadratic field based key exchange protocol PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 89 - 112
- [45] Security analysis of security protocol Swift implementations based on computational model Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190
- [46] A Security Analysis Method for Security Protocol Implementations Based on Message Construction APPLIED SCIENCES-BASEL, 2018, 8 (12):
- [47] Formal modeling and security analysis method of security protocol based on CPN Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
- [49] A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis Computers and Security, 2020, 96