共 50 条
- [22] Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure Personal and Ubiquitous Computing, 2018, 22 : 55 - 67
- [23] Security Analysis of Out-of-Band Device Pairing Protocols: A Survey WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
- [24] Develop secure database system with security extended ER model KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1005 - 1010
- [25] Analysis of security requirements for cryptographic voting protocols (extended abstract) ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [26] Security Analysis of Secure Data Aggregation Protocols in Wireless Sensor Networks 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 471 - 474
- [29] Model Driven Security Analysis of IDaaS Protocols SERVICE-ORIENTED COMPUTING, 2011, 7084 : 312 - 327
- [30] Algebra model and security analysis for cryptographic protocols Science in China Series F: Information Sciences, 2004, 47 : 199 - 220