Статті в журналах з теми "Security protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (November 23, 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Повний текст джерелаRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Повний текст джерелаGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Повний текст джерелаHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Повний текст джерелаNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Повний текст джерелаAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Повний текст джерелаKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (March 15, 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Повний текст джерелаWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Повний текст джерелаDu, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (December 31, 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Повний текст джерелаBala, Suman, Gaurav Sharma, Hmani Bansal, and Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Повний текст джерелаDing, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Повний текст джерелаKang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Повний текст джерелаLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (August 26, 2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Повний текст джерелаLu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction." Applied Sciences 8, no. 12 (December 8, 2018): 2543. http://dx.doi.org/10.3390/app8122543.
Повний текст джерелаZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Повний текст джерелаWu, Fusheng, Huanguo Zhang, Wengqing Wang, Jianwei Jia, and Shi Yuan. "A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/7042835.
Повний текст джерелаChen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (September 21, 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Повний текст джерелаLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Повний текст джерелаHe, Lei, Yong Gan, Na Na Li, and Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Повний текст джерелаXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Повний текст джерелаBedarkar, Poonam, and Atul Halmare. "Security System for Car using CAN Protocol." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.
Повний текст джерелаLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen, and Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks." International Journal of Foundations of Computer Science 31, no. 02 (February 2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Повний текст джерелаOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Повний текст джерелаPeng, She Qiang, and Long Wang. "Research on RFID Multi-Authentication Protocol Based on Hash Function." Applied Mechanics and Materials 427-429 (September 2013): 2403–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2403.
Повний текст джерелаLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Повний текст джерелаRadack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (January 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Повний текст джерелаLiu, Defu, Guowu Yang, Yong Huang, and Jinzhao Wu. "Inductive Method for Evaluating RFID Security Protocols." Wireless Communications and Mobile Computing 2019 (April 11, 2019): 1–8. http://dx.doi.org/10.1155/2019/2138468.
Повний текст джерелаAbu Dhailah, Hala, Eyad Taqieddin, and Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol." Security and Communication Networks 2019 (May 23, 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.
Повний текст джерелаChevalier, Yannick, and Michaël Rusinowitch. "Implementing Security Protocol Monitors." Electronic Proceedings in Theoretical Computer Science 342 (September 6, 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.
Повний текст джерелаThomas, J., and A. J. Elbirt. "Understanding Internet Protocol Security." Information Systems Security 13, no. 4 (September 2004): 39–43. http://dx.doi.org/10.1201/1086/44640.13.4.20040901/83731.6.
Повний текст джерелаBenson, Glenn. "Portable security transaction protocol." Computer Networks 51, no. 3 (February 2007): 751–66. http://dx.doi.org/10.1016/j.comnet.2006.06.004.
Повний текст джерелаThammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol." Symmetry 12, no. 10 (October 9, 2020): 1649. http://dx.doi.org/10.3390/sym12101649.
Повний текст джерелаSong, Jiawen, Meihua Xiao, Tong Zhang, and Haoyang Zhou. "Proving authentication property of PUF-based mutual authentication protocol based on logic of events." Soft Computing 26, no. 2 (November 12, 2021): 841–52. http://dx.doi.org/10.1007/s00500-021-06163-9.
Повний текст джерелаAng Soh, Zhen, and Swee Huay Heng. "Security and Privacy of Contact Tracing Protocols for COVID-19." Journal of Engineering Technology and Applied Physics 4, no. 1 (March 15, 2022): 30–34. http://dx.doi.org/10.33093/jetap.2022.4.1.5.
Повний текст джерелаHuo, Lin, Yi Lin Jiang, and Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol." Advanced Materials Research 846-847 (November 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Повний текст джерелаTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (July 31, 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Повний текст джерелаSafkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (August 21, 2018): 82. http://dx.doi.org/10.3390/fi10090082.
Повний текст джерелаSun, Xin, Piotr Kulicki, and Mirek Sopek. "Lottery and Auction on Quantum Blockchain." Entropy 22, no. 12 (December 5, 2020): 1377. http://dx.doi.org/10.3390/e22121377.
Повний текст джерелаMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Повний текст джерелаCha, Eun-Chul, and Hyoung-Kee Choi. "Evaluation of Security Protocols for the Session Initiation Protocol." KIPS Transactions:PartC 14C, no. 1 (February 28, 2007): 55–64. http://dx.doi.org/10.3745/kipstc.2007.14-c.1.055.
Повний текст джерелаWang, Fang. "The Security Study of an EC Protocol Based on Casper/FDR2." Applied Mechanics and Materials 681 (October 2014): 249–52. http://dx.doi.org/10.4028/www.scientific.net/amm.681.249.
Повний текст джерелаNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Повний текст джерелаAljumaie, Ghada Sultan, and Wajdi Alhakami. "A Secure LEACH-PRO Protocol Based on Blockchain." Sensors 22, no. 21 (November 2, 2022): 8431. http://dx.doi.org/10.3390/s22218431.
Повний текст джерелаTang, Lin, En Jian Bai, and Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard." Advanced Materials Research 403-408 (November 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.
Повний текст джерелаFeng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Повний текст джерелаTian, Yangguang, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, and Yong Yu. "One-Round Attribute-Based Key Exchange in the Multi-Party Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 725–42. http://dx.doi.org/10.1142/s0129054117400159.
Повний текст джерелаLi, Shu, Xi Yang, and Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers." Applied Mechanics and Materials 303-306 (February 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.
Повний текст джерелаZhao, Zi-An, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan, and Jianwei Liu. "A Scalable Security Protocol for Intravehicular Controller Area Network." Security and Communication Networks 2021 (December 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/2314520.
Повний текст джерелаLi, Ping, and Lin Ning. "Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN." Advanced Materials Research 734-737 (August 2013): 3107–13. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3107.
Повний текст джерелаNobelis, N., K. Boudaoud, C. Delettre, and M. Riveill. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach." International Journal of Distributed Systems and Technologies 3, no. 1 (January 2012): 1–16. http://dx.doi.org/10.4018/jdst.2012010101.
Повний текст джерела