共 50 条
- [31] Web Service Security Management Using Semantic Web Techniques [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2256 - 2260
- [32] RGSS-Negotiation: A Genetic-Based Approach for Web Service Security Negotiation [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 53 - 58
- [33] A new service-based computing security model with neural cryptography [J]. PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 154 - 156
- [34] Cross-Layer Security Based on Optical CDMA and Algorithmic Cryptography [J]. 2016 IEEE OPTOELECTRONICS GLOBAL CONFERENCE (OGC), 2016, : 17 - 18
- [35] Datagram Transport Layer Security Protocol with Identity-Based Cryptography [J]. Ruan Jian Xue Bao, (90-97):
- [36] Physical layer security: All-optical cryptography in access networks [J]. ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, 2008, : 127 - +
- [37] Physical-Layer Security: Combining Error Control Coding and Cryptography [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1833 - 1837
- [38] A security model design in Web Service environment [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 736 - 740
- [39] A New Quantitative Model for Web Service Security [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 749 - 755
- [40] Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer [J]. FUTURE INTERNET, 2022, 14 (05):