共 50 条
- [41] On the security of the Tor authentication protocol [J]. Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
- [42] Research on the optimization of communication protocol in network security protocol [J]. Soft Computing, 2022, 26 : 7959 - 7966
- [43] A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement [J]. 2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 232 - +
- [44] A Security Analysis and Revised Security Extension for the Precision Time Protocol [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL AND COMMUNICATION (ISPCS 2016), 2016, : 12 - 17
- [45] Voice interactive personalized security protocol: Definition and security analysis [J]. 2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 31 - 36
- [48] SPUC: Security protocol for ubiquitous computing [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
- [49] OCPP Protocol: Security Threats and Challenges [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2452 - 2459
- [50] Establishing and preserving protocol security goals [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (02) : 203 - 267