CORC

浏览/检索结果: 共7条,第1-7条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Taxonomy and analysis of security protocols for Internet of Things 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: 89
作者:  Das, Ashok Kumar;  Zeadally, Sherali;  He, Debiao
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography 期刊论文
COMPUTER NETWORKS, 2017, 卷号: 128
作者:  He, Debiao;  Zeadally, Sherali;  Wu, Libing;  Wang, Huaqun
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/05
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography 期刊论文
Computer Networks, 2016
作者:  He, Debiao;  Zeadally, Sherali;  Wu, Libing;  Wang, Huaqun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Research of Formal Design of Authentication Protocols 会议论文
作者:  Guan, Huanmei;  Zhou, Yajie
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace