-
1
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
2
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: “…authentication;anonymity;security analysis…”
Get full text
Article -
3
Underlying Security Transmission Design for Orthogonal Time Frequency Space (OTFS) Modulation
Published 2022-10-01Subjects: Get full text
Article -
4
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: “…big data;security analysis;attack detection…”
Get full text
Article -
5
On the security of RSA textbook signature scheme on Paillier ciphertext
Published 2016-12-01Subjects: “…security analysis…”
Get full text
Article -
6
Image encryption using 3D Logistic-Sine cascade map
Published 2020-01-01Subjects: Get full text
Article -
7
Simple, Near-Optimal Quantum Protocols for Die-Rolling
Published 2017-07-01Subjects: Get full text
Article -
8
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
9
Design and realization of a high-speed traffic collection and processing scheme for campus networks using FPGA
Published 2024-11-01Subjects: Get full text
Article -
10
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
11
Dynamic Distributed Honeypot Based on Blockchain
Published 2019-01-01Subjects: Get full text
Article -
12
Attack Graph Utilization for Wastewater Treatment Plant
Published 2022-10-01Subjects: Get full text
Article -
13
Application of security analysis technology for network big data
Published 2017-03-01Subjects: “…big data;security analysis;attack detection…”
Get full text
Article -
14
Suggested Integral Analysis for Chaos-Based Image Cryptosystems
Published 2019-08-01Subjects: Get full text
Article -
15
Blockchain and Machine Learning: A Critical Review on Security
Published 2023-05-01Subjects: Get full text
Article -
16
Finite-key security analysis of quantum key distribution with imperfect light sources
Published 2015-01-01Subjects: Get full text
Article -
17
Simulation of Attacks for Security in Wireless Sensor Network
Published 2016-11-01Subjects: Get full text
Article -
18
Network transition security for transmission switching
Published 2019-01-01Subjects: Get full text
Article -
19
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: “…certificateless;multi-signature;security analysis;forgery attack…”
Get full text
Article -
20
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article