Articoli di riviste sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Younes, Osama, e Umar Albalawi. "Securing Session Initiation Protocol". Sensors 22, n. 23 (23 novembre 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Testo completoRekha, H., e M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n. 1 (1 gennaio 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Testo completoGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols". it - Information Technology 62, n. 5-6 (16 dicembre 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Testo completoHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang e Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology". IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Testo completoNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik e Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Testo completoAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri e Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Testo completoKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You e Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone". Sensors 21, n. 6 (15 marzo 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Testo completoWang, Ying Lian, e Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key". Advanced Materials Research 951 (maggio 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Testo completoDu, Jinze, Chengtai Gao e Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n. 1 (31 dicembre 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Testo completoBala, Suman, Gaurav Sharma, Hmani Bansal e Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols". Scalable Computing: Practice and Experience 20, n. 1 (9 marzo 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Testo completoDing, Xia Jun, Xiao Dan Jiang e Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol". Advanced Materials Research 267 (giugno 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Testo completoKang, Burong, Xinyu Meng, Lei Zhang e Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness". International Journal of Foundations of Computer Science 30, n. 04 (giugno 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Testo completoLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang e Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks". Electronics 8, n. 9 (26 agosto 2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Testo completoLu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang e Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction". Applied Sciences 8, n. 12 (8 dicembre 2018): 2543. http://dx.doi.org/10.3390/app8122543.
Testo completoZhang, Ke, Kai Xu e Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks". Wireless Communications and Mobile Computing 2018 (16 luglio 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Testo completoWu, Fusheng, Huanguo Zhang, Wengqing Wang, Jianwei Jia e Shi Yuan. "A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/7042835.
Testo completoChen, Xiaojuan, e Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic". Applied Sciences 10, n. 18 (21 settembre 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Testo completoLu, Siqi, Qingdi Han, Xuyang Miao e Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif". Journal of Physics: Conference Series 2132, n. 1 (1 dicembre 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Testo completoHe, Lei, Yong Gan, Na Na Li e Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID". Applied Mechanics and Materials 29-32 (agosto 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Testo completoXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang e Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN". Computational Intelligence and Neuroscience 2022 (23 agosto 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Testo completoBedarkar, Poonam, e Atul Halmare. "Security System for Car using CAN Protocol". International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (28 febbraio 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.
Testo completoLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen e Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks". International Journal of Foundations of Computer Science 31, n. 02 (febbraio 2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Testo completoOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim e YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes". Sensors 21, n. 4 (21 febbraio 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Testo completoPeng, She Qiang, e Long Wang. "Research on RFID Multi-Authentication Protocol Based on Hash Function". Applied Mechanics and Materials 427-429 (settembre 2013): 2403–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2403.
Testo completoLi, Fu Lin, Jie Yang, Hong Wei Zhou e Ying Liu. "A New Dynamic Protocol Analysis Model". Advanced Materials Research 765-767 (settembre 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Testo completoRadack, Shirley, e Rick Kuhn. "Managing Security: The Security Content Automation Protocol". IT Professional 13, n. 1 (gennaio 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Testo completoLiu, Defu, Guowu Yang, Yong Huang e Jinzhao Wu. "Inductive Method for Evaluating RFID Security Protocols". Wireless Communications and Mobile Computing 2019 (11 aprile 2019): 1–8. http://dx.doi.org/10.1155/2019/2138468.
Testo completoAbu Dhailah, Hala, Eyad Taqieddin e Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol". Security and Communication Networks 2019 (23 maggio 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.
Testo completoChevalier, Yannick, e Michaël Rusinowitch. "Implementing Security Protocol Monitors". Electronic Proceedings in Theoretical Computer Science 342 (6 settembre 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.
Testo completoThomas, J., e A. J. Elbirt. "Understanding Internet Protocol Security". Information Systems Security 13, n. 4 (settembre 2004): 39–43. http://dx.doi.org/10.1201/1086/44640.13.4.20040901/83731.6.
Testo completoBenson, Glenn. "Portable security transaction protocol". Computer Networks 51, n. 3 (febbraio 2007): 751–66. http://dx.doi.org/10.1016/j.comnet.2006.06.004.
Testo completoThammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol". Symmetry 12, n. 10 (9 ottobre 2020): 1649. http://dx.doi.org/10.3390/sym12101649.
Testo completoSong, Jiawen, Meihua Xiao, Tong Zhang e Haoyang Zhou. "Proving authentication property of PUF-based mutual authentication protocol based on logic of events". Soft Computing 26, n. 2 (12 novembre 2021): 841–52. http://dx.doi.org/10.1007/s00500-021-06163-9.
Testo completoAng Soh, Zhen, e Swee Huay Heng. "Security and Privacy of Contact Tracing Protocols for COVID-19". Journal of Engineering Technology and Applied Physics 4, n. 1 (15 marzo 2022): 30–34. http://dx.doi.org/10.33093/jetap.2022.4.1.5.
Testo completoHuo, Lin, Yi Lin Jiang e Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol". Advanced Materials Research 846-847 (novembre 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Testo completoTambunan, Alexander Theo Philus, Adi Prijuna Lubis e Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7". J-Com (Journal of Computer) 1, n. 2 (31 luglio 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Testo completoSafkhani, Masoumeh, Nasour Bagheri e Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems". Future Internet 10, n. 9 (21 agosto 2018): 82. http://dx.doi.org/10.3390/fi10090082.
Testo completoSun, Xin, Piotr Kulicki e Mirek Sopek. "Lottery and Auction on Quantum Blockchain". Entropy 22, n. 12 (5 dicembre 2020): 1377. http://dx.doi.org/10.3390/e22121377.
Testo completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n. 1 (20 gennaio 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Testo completoCha, Eun-Chul, e Hyoung-Kee Choi. "Evaluation of Security Protocols for the Session Initiation Protocol". KIPS Transactions:PartC 14C, n. 1 (28 febbraio 2007): 55–64. http://dx.doi.org/10.3745/kipstc.2007.14-c.1.055.
Testo completoWang, Fang. "The Security Study of an EC Protocol Based on Casper/FDR2". Applied Mechanics and Materials 681 (ottobre 2014): 249–52. http://dx.doi.org/10.4028/www.scientific.net/amm.681.249.
Testo completoNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik e Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks". Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Testo completoAljumaie, Ghada Sultan, e Wajdi Alhakami. "A Secure LEACH-PRO Protocol Based on Blockchain". Sensors 22, n. 21 (2 novembre 2022): 8431. http://dx.doi.org/10.3390/s22218431.
Testo completoTang, Lin, En Jian Bai e Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard". Advanced Materials Research 403-408 (novembre 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.
Testo completoFeng, Tao, e Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol". Security and Communication Networks 2022 (12 luglio 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Testo completoTian, Yangguang, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang e Yong Yu. "One-Round Attribute-Based Key Exchange in the Multi-Party Setting". International Journal of Foundations of Computer Science 28, n. 06 (settembre 2017): 725–42. http://dx.doi.org/10.1142/s0129054117400159.
Testo completoLi, Shu, Xi Yang e Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers". Applied Mechanics and Materials 303-306 (febbraio 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.
Testo completoZhao, Zi-An, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan e Jianwei Liu. "A Scalable Security Protocol for Intravehicular Controller Area Network". Security and Communication Networks 2021 (31 dicembre 2021): 1–13. http://dx.doi.org/10.1155/2021/2314520.
Testo completoLi, Ping, e Lin Ning. "Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN". Advanced Materials Research 734-737 (agosto 2013): 3107–13. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3107.
Testo completoNobelis, N., K. Boudaoud, C. Delettre e M. Riveill. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach". International Journal of Distributed Systems and Technologies 3, n. 1 (gennaio 2012): 1–16. http://dx.doi.org/10.4018/jdst.2012010101.
Testo completo