共 50 条
- [41] Loose Security Protocol Algorithm Design and Performance Analysis Method 2016 INTERNATIONAL CONGRESS ON COMPUTATION ALGORITHMS IN ENGINEERING (ICCAE 2016), 2016, : 100 - 106
- [42] Analysis of Security Protocol Based on Petri Nets 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51
- [43] Security Protocol Analysis Based on Rewriting Approximation PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 318 - 322
- [44] Algebra model and security analysis for cryptographic protocols SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [46] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
- [47] The Haar Analysis of Nonlinearity Cryptographic Security Criterion PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 101 - 105
- [48] Security Investment Over Networks with Bounded Rational Agents: Analysis and Distributed Algorithm 2023 PROCEEDINGS OF THE CONFERENCE ON CONTROL AND ITS APPLICATIONS, CT, 2023, : 72 - 79
- [49] A Review of Cloud Security Based on Cryptographic Mechanisms 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
- [50] Algebra model and security analysis for cryptographic protocols Science in China Series F: Information Sciences, 2004, 47 : 199 - 220