共 50 条
- [31] Incorporating security requirements into communication protocols in multi-agent software systems EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 159 - 160
- [32] Security-typed languages for implementation of cryptographic protocols: A case study COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
- [33] The Implementation and Application of Security Evaluation System of Electric Power Communication Network 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1162 - 1165
- [34] An Adaptive Cloud Communication Network Using VSAT with Enhanced Security Implementation PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 117 - 125
- [35] Protocols for network throughput optimisation in intelligent vehicle highway communication systems 1996 IEEE 46TH VEHICULAR TECHNOLOGY CONFERENCE, PROCEEDINGS, VOLS 1-3: MOBILE TECHNOLOGY FOR THE HUMAN RACE, 1996, : 1801 - 1804
- [36] The Study and Implementation of the Wireless Network Data Security Model FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
- [37] Study on security of network and implementation of VPN based on FreeSWAN Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2003, 24 (05):
- [39] Design and Implementation of Security Risk Assessment System for Electric Power Communication Network INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION CONTROL (ICEEAC 2017), 2017, 123 : 482 - 487