Showing 1 - 20 results of 121 for search '"security protocols"', query time: 0.44s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Analysis and improvement of sensor networks security protocol by YAN Li-li1, PENG Dai-yuan1, GAO Yue-xiang1

    Published 2011-01-01
    Subjects: “…wireless sensor networks;security protocols;formal analysis;strand spaces…”
    Get full text
    Article
  9. 9
  10. 10

    Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols by FENG Chao, ZHANG Quan, TANG Chao-jing

    Published 2011-01-01
    Subjects: “…security protocols;Diffie-Hellman primitives;Kerberos protocol;mechanized proofs…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    SAT-based lazy formal analysis method for security protocols by Chun-xiang GU, Huan-xiao WANG, Yong-hui ZHENG, Dan XIN, Nan LIU

    Published 2014-11-01
    Subjects: “…security protocols;formalization analysis;Boolean satisfiability problem;lazy analyze;type flaw attack…”
    Get full text
    Article
  20. 20