Articoli di riviste sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (November 23, 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Testo completoSabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (December 9, 2022): 1–7. https://doi.org/10.5281/zenodo.14866540.
Testo completoSharma, Garima, and Harish Mittal. "SS7 Signaling Protocol ? Security." International Journal of Scientific Engineering and Research 4, no. 5 (May 27, 2016): 31–34. https://doi.org/10.70729/ijser15811.
Testo completoRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Testo completoGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Testo completoNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Testo completoAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Testo completoHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Testo completoKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (March 15, 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Testo completoWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Testo completoDu, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (December 31, 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Testo completoAmit Singh and Dr. Devendra Singh. "Genetic Algorithm-Based Secure Routing Protocol for Wireless Sensor Networks." International Research Journal on Advanced Engineering Hub (IRJAEH) 1, no. 01 (December 20, 2023): 46–52. http://dx.doi.org/10.47392/irjaeh.2023.007.
Testo completoDing, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Testo completoGalchynsky, Leonid, and Valeriia Korolova. "ASSESSMENT OF THE SECURITY OF WIRELESS NETWORKS IN AN URBAN ENVIRONMENT, TAKING INTO ACCOUNT THE USE OF SECURITY PROTOCOLS." Інфокомунікаційні та комп’ютерні технології, no. 2(6) (2023): 9–21. http://dx.doi.org/10.36994/2788-5518-2023-02-06-01.
Testo completoZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Testo completoWu, Fusheng, Huanguo Zhang, Wengqing Wang, Jianwei Jia, and Shi Yuan. "A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/7042835.
Testo completoLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (August 26, 2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Testo completoBala, Suman, Gaurav Sharma, Hmani Bansal, and Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Testo completoFeng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (February 18, 2024): 118. http://dx.doi.org/10.3390/info15020118.
Testo completoLu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction." Applied Sciences 8, no. 12 (December 8, 2018): 2543. http://dx.doi.org/10.3390/app8122543.
Testo completoLu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (January 17, 2024): 80. http://dx.doi.org/10.3390/e26010080.
Testo completoChen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (September 21, 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Testo completoKang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Testo completoHe, Lei, Yong Gan, Na Na Li, and Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Testo completoBella, Giampaolo. "What is Correctness of Security Protocols?" JUCS - Journal of Universal Computer Science 14, no. (12) (June 28, 2008): 2083–106. https://doi.org/10.3217/jucs-014-12-2083.
Testo completoXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Testo completoLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Testo completoOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Testo completoLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen, and Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks." International Journal of Foundations of Computer Science 31, no. 02 (February 2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Testo completoKolev, Kaloyan, and Yordan Shterev. "WIRELESS SECURITY ISSUES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 150–54. http://dx.doi.org/10.17770/etr2024vol4.8186.
Testo completoU., Pavan Kumar. "IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (May 27, 2013): 67–83. https://doi.org/10.5281/zenodo.4289544.
Testo completoPeng, She Qiang, and Long Wang. "Research on RFID Multi-Authentication Protocol Based on Hash Function." Applied Mechanics and Materials 427-429 (September 2013): 2403–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2403.
Testo completoXiao, Meihua, Yuqiong Chen, Zehuan Li, Quangang Chen, and Ruihan Xu. "Proving Mutual Authentication Property of Industrial Internet of Things Multi-Factor Authentication Protocol Based on Logic of Events." Electronics 13, no. 1 (December 30, 2023): 177. http://dx.doi.org/10.3390/electronics13010177.
Testo completoAbu Dhailah, Hala, Eyad Taqieddin, and Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol." Security and Communication Networks 2019 (May 23, 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.
Testo completoLiu, Defu, Guowu Yang, Yong Huang, and Jinzhao Wu. "Inductive Method for Evaluating RFID Security Protocols." Wireless Communications and Mobile Computing 2019 (April 11, 2019): 1–8. http://dx.doi.org/10.1155/2019/2138468.
Testo completoAng Soh, Zhen, and Swee Huay Heng. "Security and Privacy of Contact Tracing Protocols for COVID-19." Journal of Engineering Technology and Applied Physics 4, no. 1 (March 15, 2022): 30–34. http://dx.doi.org/10.33093/jetap.2022.4.1.5.
Testo completoSong, Jiawen, Meihua Xiao, Tong Zhang, and Haoyang Zhou. "Proving authentication property of PUF-based mutual authentication protocol based on logic of events." Soft Computing 26, no. 2 (November 12, 2021): 841–52. http://dx.doi.org/10.1007/s00500-021-06163-9.
Testo completoThammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol." Symmetry 12, no. 10 (October 9, 2020): 1649. http://dx.doi.org/10.3390/sym12101649.
Testo completoChe, Xin, Yangyang Geng, Ge Zhang, and Mufeng Wang. "Fuzzing Technology Based on Information Theory for Industrial Proprietary Protocol." Electronics 12, no. 14 (July 11, 2023): 3041. http://dx.doi.org/10.3390/electronics12143041.
Testo completoHuo, Lin, Yi Lin Jiang, and Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol." Advanced Materials Research 846-847 (November 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Testo completoTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (July 31, 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Testo completoM. M., Yusuf, Fumlack K. G., Caleb M., and Okpalaifeako L. C. "An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer." British Journal of Computer, Networking and Information Technology 7, no. 2 (July 12, 2024): 49–67. http://dx.doi.org/10.52589/bjcnit-oyirlauk.
Testo completoTian, Yuan, Nanyijia Zhang, and Jian Li. "Two Novel Semi-Quantum Secure Direct Communication Protocols in IoT." Sensors 24, no. 24 (December 14, 2024): 7990. https://doi.org/10.3390/s24247990.
Testo completoSafkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (August 21, 2018): 82. http://dx.doi.org/10.3390/fi10090082.
Testo completoLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Testo completoSun, Xin, Piotr Kulicki, and Mirek Sopek. "Lottery and Auction on Quantum Blockchain." Entropy 22, no. 12 (December 5, 2020): 1377. http://dx.doi.org/10.3390/e22121377.
Testo completoHuang, Chao, Bin Wang, Zhaoyang Bao, and Wenhao Qi. "2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated Learning." Applied Sciences 14, no. 15 (July 30, 2024): 6664. http://dx.doi.org/10.3390/app14156664.
Testo completoLee, JoonYoung, Jihyeon Oh, and Youngho Park. "A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks." Electronics 12, no. 6 (March 13, 2023): 1368. http://dx.doi.org/10.3390/electronics12061368.
Testo completoLee, Sangjun, Seunghwan Son, DeokKyu Kwon, Yohan Park, and Youngho Park. "A Secure and Efficient Authentication Scheme for Fog-Based Vehicular Ad Hoc Networks." Applied Sciences 15, no. 3 (January 25, 2025): 1229. https://doi.org/10.3390/app15031229.
Testo completoNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Testo completo