共 48 条
- [31] Proposing and verifying a security protocol for hash function-based IoT communication system CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 497 - 504
- [33] MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2315 - 2317
- [34] Proposing and verifying a security protocol for hash function-based IoT communication system Cluster Computing, 2016, 19 : 497 - 504
- [35] Design and realization of multi-protocol communication model for network security management system ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2007, 4847 : 497 - 507
- [36] COMPUTER SYSTEM AND MODELLING OF THREATS TO ENERGY SECURITY OF MOLDOVA IN CASE OF INTERSYSTEM COMMUNICATION DISCONNECTION PROBLEMELE ENERGETICII REGIONALE, 2010, (03): : 1 - 9
- [38] Characterization of table renewal in the group management server of a regional computer communication network system DIGITAL CONVERGENCE FOR CREATIVE DIVERGENCE, VOL 2: TECHNICAL INTERACTIVE SESSIONS, 1999, : 227 - 233
- [39] AN SECURITY-ENHANCED AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR NEXT GENERATION MOBILE COMMUNICATION SYSTEM 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 247 - 250
- [40] Research and Design Embedded Security Computer Based on TMR for Train-Ground Communication System SUSTAINABLE ENVIRONMENT AND TRANSPORTATION, PTS 1-4, 2012, 178-181 : 2673 - +