Showing 1 - 20 results of 204 for search '"Security analysis"', query time: 0.65s Refine Results
  1. 1
  2. 2

    Security flaws and improvement to a wireless authentication protocol with anonymity by PENG Hua-xi, FENG Deng-guo

    Published 2006-01-01
    Subjects: “…authentication;anonymity;security analysis…”
    Get full text
    Article
  3. 3
  4. 4

    Big Data Application in Network Security Analysis by Shuai Wang, Laifu Wang, Huamin Jin, Jun Shen

    Published 2015-07-01
    Subjects: “…big data;security analysis;attack detection…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Application of security analysis technology for network big data by Laifu WANG, Huamin JIN, Dongxin LIU, Shuai WANG

    Published 2017-03-01
    Subjects: “…big data;security analysis;attack detection…”
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model by Yan XU, Liu-sheng HUANG, Miao-miao TIAN, Hong ZHONG

    Published 2014-11-01
    Subjects: “…certificateless;multi-signature;security analysis;forgery attack…”
    Get full text
    Article
  20. 20