共 50 条
- [41] Review of Internet of Things security protocols - A Bibliometric Analysis 2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
- [42] Security in the Internet of Things: A Survey on Application Layer Protocols 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
- [43] Network Externalities and the Deployment of Security Features and Protocols in the Internet SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 37 - +
- [44] Analyzing the security flaws of internet key exchange protocols Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
- [45] A Security Evaluation of Popular Internet of Things Protocols for Manufacturers 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
- [46] Internet of Things: Existing Protocols and Technological Challenges in Security PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [47] Automated Design of Non-repudiation Security Protocols 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
- [48] On the automated correction of security protocols susceptible to a replay attack COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 594 - +
- [49] Automated security analysis techniques in MANET routing protocols 1600, Science Press (43): : 56 - 61
- [50] Automated Verification of Timed Security Protocols with Clock Drift FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530