-
1
Key Agreement and Authentication Protocols in the Internet of Things: A Survey
Published 2022-12-01Subjects: Get full text
Article -
2
CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY
Published 2017-06-01Subjects: Get full text
Article -
3
Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
Published 2024-11-01Subjects: Get full text
Article -
4
A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
Published 2022-08-01Subjects: Get full text
Article -
5
<i>RootLogChain</i>: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root
Published 2021-11-01Subjects: Get full text
Article -
6
-
7
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Subjects: “…security protocols…”
Get full text
Article -
8
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: “…wireless sensor networks;security protocols;formal analysis;strand spaces…”
Get full text
Article -
9
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
10
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Subjects: “…security protocols;Diffie-Hellman primitives;Kerberos protocol;mechanized proofs…”
Get full text
Article -
11
Quantitative analysis of the security performance in wireless LANs
Published 2017-07-01Subjects: Get full text
Article -
12
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
Published 2021-04-01Subjects: “…security protocols…”
Get full text
Article -
13
Secure Plug-in Electric Vehicle (PEV) Charging in a Smart Grid Network
Published 2017-07-01Subjects: Get full text
Article -
14
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
15
Security Verification in the Context of 5G Sensor Networks
Published 2021-06-01Subjects: Get full text
Article -
16
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Published 2023-11-01Subjects: Get full text
Article -
17
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
Published 2023-05-01Subjects: Get full text
Article -
18
The blockchain: a new framework for robotic swarm systems
Published 2017Subjects: Get full text
Article -
19
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols;formalization analysis;Boolean satisfiability problem;lazy analyze;type flaw attack…”
Get full text
Article -
20
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article