Artículos de revistas sobre el tema "Security protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Younes, Osama y Umar Albalawi. "Securing Session Initiation Protocol". Sensors 22, n.º 23 (23 de noviembre de 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Texto completoRekha, H. y M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n.º 1 (1 de enero de 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texto completoGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols". it - Information Technology 62, n.º 5-6 (16 de diciembre de 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Texto completoHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang y Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology". IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Texto completoNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik y Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Texto completoAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri y Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Texto completoKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You y Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone". Sensors 21, n.º 6 (15 de marzo de 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Texto completoWang, Ying Lian y Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key". Advanced Materials Research 951 (mayo de 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Texto completoDu, Jinze, Chengtai Gao y Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n.º 1 (31 de diciembre de 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Texto completoBala, Suman, Gaurav Sharma, Hmani Bansal y Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols". Scalable Computing: Practice and Experience 20, n.º 1 (9 de marzo de 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Texto completoDing, Xia Jun, Xiao Dan Jiang y Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol". Advanced Materials Research 267 (junio de 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Texto completoKang, Burong, Xinyu Meng, Lei Zhang y Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness". International Journal of Foundations of Computer Science 30, n.º 04 (junio de 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Texto completoLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang y Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks". Electronics 8, n.º 9 (26 de agosto de 2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Texto completoLu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang y Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction". Applied Sciences 8, n.º 12 (8 de diciembre de 2018): 2543. http://dx.doi.org/10.3390/app8122543.
Texto completoZhang, Ke, Kai Xu y Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks". Wireless Communications and Mobile Computing 2018 (16 de julio de 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Texto completoWu, Fusheng, Huanguo Zhang, Wengqing Wang, Jianwei Jia y Shi Yuan. "A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/7042835.
Texto completoChen, Xiaojuan y Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic". Applied Sciences 10, n.º 18 (21 de septiembre de 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Texto completoLu, Siqi, Qingdi Han, Xuyang Miao y Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif". Journal of Physics: Conference Series 2132, n.º 1 (1 de diciembre de 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Texto completoHe, Lei, Yong Gan, Na Na Li y Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID". Applied Mechanics and Materials 29-32 (agosto de 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Texto completoXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang y Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN". Computational Intelligence and Neuroscience 2022 (23 de agosto de 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Texto completoBedarkar, Poonam y Atul Halmare. "Security System for Car using CAN Protocol". International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (28 de febrero de 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.
Texto completoLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen y Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks". International Journal of Foundations of Computer Science 31, n.º 02 (febrero de 2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Texto completoOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim y YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes". Sensors 21, n.º 4 (21 de febrero de 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Texto completoPeng, She Qiang y Long Wang. "Research on RFID Multi-Authentication Protocol Based on Hash Function". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2403–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2403.
Texto completoLi, Fu Lin, Jie Yang, Hong Wei Zhou y Ying Liu. "A New Dynamic Protocol Analysis Model". Advanced Materials Research 765-767 (septiembre de 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Texto completoRadack, Shirley y Rick Kuhn. "Managing Security: The Security Content Automation Protocol". IT Professional 13, n.º 1 (enero de 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Texto completoLiu, Defu, Guowu Yang, Yong Huang y Jinzhao Wu. "Inductive Method for Evaluating RFID Security Protocols". Wireless Communications and Mobile Computing 2019 (11 de abril de 2019): 1–8. http://dx.doi.org/10.1155/2019/2138468.
Texto completoAbu Dhailah, Hala, Eyad Taqieddin y Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol". Security and Communication Networks 2019 (23 de mayo de 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.
Texto completoChevalier, Yannick y Michaël Rusinowitch. "Implementing Security Protocol Monitors". Electronic Proceedings in Theoretical Computer Science 342 (6 de septiembre de 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.
Texto completoThomas, J. y A. J. Elbirt. "Understanding Internet Protocol Security". Information Systems Security 13, n.º 4 (septiembre de 2004): 39–43. http://dx.doi.org/10.1201/1086/44640.13.4.20040901/83731.6.
Texto completoBenson, Glenn. "Portable security transaction protocol". Computer Networks 51, n.º 3 (febrero de 2007): 751–66. http://dx.doi.org/10.1016/j.comnet.2006.06.004.
Texto completoThammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol". Symmetry 12, n.º 10 (9 de octubre de 2020): 1649. http://dx.doi.org/10.3390/sym12101649.
Texto completoSong, Jiawen, Meihua Xiao, Tong Zhang y Haoyang Zhou. "Proving authentication property of PUF-based mutual authentication protocol based on logic of events". Soft Computing 26, n.º 2 (12 de noviembre de 2021): 841–52. http://dx.doi.org/10.1007/s00500-021-06163-9.
Texto completoAng Soh, Zhen y Swee Huay Heng. "Security and Privacy of Contact Tracing Protocols for COVID-19". Journal of Engineering Technology and Applied Physics 4, n.º 1 (15 de marzo de 2022): 30–34. http://dx.doi.org/10.33093/jetap.2022.4.1.5.
Texto completoHuo, Lin, Yi Lin Jiang y Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol". Advanced Materials Research 846-847 (noviembre de 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Texto completoTambunan, Alexander Theo Philus, Adi Prijuna Lubis y Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7". J-Com (Journal of Computer) 1, n.º 2 (31 de julio de 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Texto completoSafkhani, Masoumeh, Nasour Bagheri y Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems". Future Internet 10, n.º 9 (21 de agosto de 2018): 82. http://dx.doi.org/10.3390/fi10090082.
Texto completoSun, Xin, Piotr Kulicki y Mirek Sopek. "Lottery and Auction on Quantum Blockchain". Entropy 22, n.º 12 (5 de diciembre de 2020): 1377. http://dx.doi.org/10.3390/e22121377.
Texto completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n.º 1 (20 de enero de 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Texto completoCha, Eun-Chul y Hyoung-Kee Choi. "Evaluation of Security Protocols for the Session Initiation Protocol". KIPS Transactions:PartC 14C, n.º 1 (28 de febrero de 2007): 55–64. http://dx.doi.org/10.3745/kipstc.2007.14-c.1.055.
Texto completoWang, Fang. "The Security Study of an EC Protocol Based on Casper/FDR2". Applied Mechanics and Materials 681 (octubre de 2014): 249–52. http://dx.doi.org/10.4028/www.scientific.net/amm.681.249.
Texto completoNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik y Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks". Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Texto completoAljumaie, Ghada Sultan y Wajdi Alhakami. "A Secure LEACH-PRO Protocol Based on Blockchain". Sensors 22, n.º 21 (2 de noviembre de 2022): 8431. http://dx.doi.org/10.3390/s22218431.
Texto completoTang, Lin, En Jian Bai y Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard". Advanced Materials Research 403-408 (noviembre de 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.
Texto completoFeng, Tao y Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol". Security and Communication Networks 2022 (12 de julio de 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Texto completoTian, Yangguang, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang y Yong Yu. "One-Round Attribute-Based Key Exchange in the Multi-Party Setting". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 725–42. http://dx.doi.org/10.1142/s0129054117400159.
Texto completoLi, Shu, Xi Yang y Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers". Applied Mechanics and Materials 303-306 (febrero de 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.
Texto completoZhao, Zi-An, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan y Jianwei Liu. "A Scalable Security Protocol for Intravehicular Controller Area Network". Security and Communication Networks 2021 (31 de diciembre de 2021): 1–13. http://dx.doi.org/10.1155/2021/2314520.
Texto completoLi, Ping y Lin Ning. "Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN". Advanced Materials Research 734-737 (agosto de 2013): 3107–13. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3107.
Texto completoNobelis, N., K. Boudaoud, C. Delettre y M. Riveill. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach". International Journal of Distributed Systems and Technologies 3, n.º 1 (enero de 2012): 1–16. http://dx.doi.org/10.4018/jdst.2012010101.
Texto completo