共 50 条
- [21] PKI-based mutual connections constrained with discrepancy of trust domains Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (10): : 1804 - 1809
- [22] Extending BAN Logic for Reasoning with Modern PKI-based Protocols 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
- [25] Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 19 - 36
- [26] Design and implementation of a PKI-based electronic documents protection management system 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 87 - +
- [27] A Forward Secure PKI-based UMTS-AKA with Tunneling Authentication 2015 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2015, : 55 - 60
- [28] A probabilistic model for evaluating the operational cost of PKI-based financial transactions PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 149 - 159
- [30] PKI-Based Security Enhancement for IoT in 5G Networks INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 217 - 225