共 50 条
- [41] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
- [42] Towards a formal verification of an authentication protocol using non-monotonic logic PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 545 - 550
- [44] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code Wireless Personal Communications, 2014, 79 : 2595 - 2609
- [45] CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks SYMMETRY-BASEL, 2021, 13 (04):
- [47] A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1324 - 1331
- [48] A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks 20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 78 - 83