咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 14 篇 计算机科学与技术...
    • 10 篇 网络空间安全
    • 8 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 6 篇 电气工程
    • 6 篇 软件工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 理学
    • 6 篇 数学
    • 2 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 19 篇 security protoco...
  • 4 篇 authentication
  • 2 篇 radio frequency ...
  • 2 篇 formal verificat...
  • 2 篇 information secu...
  • 1 篇 4g network
  • 1 篇 passive attacks
  • 1 篇 data integrity
  • 1 篇 dynamic strand s...
  • 1 篇 epistemic logic
  • 1 篇 state explore
  • 1 篇 security infrast...
  • 1 篇 identification a...
  • 1 篇 group key agreem...
  • 1 篇 attack construct...
  • 1 篇 kripke semantics
  • 1 篇 data subterm
  • 1 篇 iot
  • 1 篇 communication
  • 1 篇 process calculus

机构

  • 2 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 information secu...
  • 1 篇 departmentofcomp...
  • 1 篇 departmentofcomp...
  • 1 篇 department of ma...
  • 1 篇 college of compu...
  • 1 篇 key laboratory f...
  • 1 篇 school of it rgt...
  • 1 篇 state key labora...
  • 1 篇 上海交通大学
  • 1 篇 institute for in...
  • 1 篇 k.u.leuven esat/...
  • 1 篇 department of ma...
  • 1 篇 laboratory of co...
  • 1 篇 school of comput...
  • 1 篇 riphah school of...
  • 1 篇 faculty of infor...
  • 1 篇 galgotia’s colle...
  • 1 篇 key laboratory o...

作者

  • 2 篇 khalid mahmood
  • 2 篇 muhammad faizan ...
  • 2 篇 saru kumari
  • 1 篇 顾永跟
  • 1 篇 张青
  • 1 篇 inderpreet kaur
  • 1 篇 minahil
  • 1 篇 wang linjing
  • 1 篇 renu mishra
  • 1 篇 温巧燕
  • 1 篇 zhao yanlong
  • 1 篇 顾明
  • 1 篇 丁一强
  • 1 篇 冯登国
  • 1 篇 sanjeev sharma
  • 1 篇 李小勇
  • 1 篇 pavel ocenasek
  • 1 篇 wei guoheng
  • 1 篇 liu suqin meng l...
  • 1 篇 邓慧杰

语言

  • 18 篇 英文
  • 1 篇 中文
检索条件"主题词=security protocol"
19 条 记 录,以下是1-10 订阅
排序:
Information security protocol Based System Identification with Binary-Valued Observations
收藏 引用
Journal of Systems Science & Complexity 2018年 第4期31卷 946-963页
作者: XU Changbao ZHAO Yanlong ZHANG Ji-Feng Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing 100049 China
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on Mobile Network Payment security protocol based on Symmetric Cryptography
Research on Mobile Network Payment Security Protocol based o...
收藏 引用
2015 3rd International Conference on Machinery,Materials and Information Technology Applications(ICMMITA 2015)
作者: Wang Linjing Zhang Peijiang Henan University of Traditional Chinese Medicine
With the rapid development of network technology and mobile terminal equipment, mobile payment has become a trend. Due to the complexity of payment environment, the payment terminal equipment performance is limited, m... 详细信息
来源: cnki会议 评论
A Lightweight Authentication protocol Scheme for RFID security
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第6期18卷 504-510页
作者: WEI Guoheng ZHANG Huanguo School of Computer Wuhan University Information security Department Naval University of Engineering
Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of exist... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Attack—Finding Algorithm for security protocols
收藏 引用
Journal of Computer Science & Technology 2002年 第4期17卷 450-463页
作者: 刘东喜 李小勇 DepartmentofComputerScienceandTechnology ShanghaiJiaotongUniversityShanghai200030P.R.China
This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity *** is based on a dynamic strand space model,which enhances the original strand space model by introducing a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An enhanced scheme for mutual authentication for healthcare services
收藏 引用
Digital Communications and Networks 2022年 第2期8卷 150-161页
作者: Salman Shamshad Muhammad Faizan Ayub Khalid Mahmood Saru Kumari Shehzad Ashraf Chaudhry Chien-Ming Chen Department of Computer Science COMSATS University IslamabadSahiwal Campus57000Pakistan Department of Mathematics Ch.Charan Singh UniversityMeerutUttar Pradesh250004India Department of Computer Engineering Faculty of Engineering and ArchitectureIstanbul Gelisim UniversityIstanbulTurkey College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Riphah School of Computing&Innovation(RSCI) Riphah International UniversityLahore CampusLahore 55150Pakistan Department of Mathematics University of Padua35131 PaduaItaly
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their ***,this architecture engenders new risks and challeng... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Progress and Prospect of Some Fundamental Research on Information security in China
收藏 引用
Journal of Computer Science & Technology 2006年 第5期21卷 740-755页
作者: 冯登国 王小云 State Key Laboratory of Information security Institute of Software Chinese Academy of Sciences Beijing 100080 P.R. China School of Mathematics and System Science Shandong University Jinan 250100 P.R. China
With the development of network and information technologies, information security is more and more widely researched in China. To know where the work is and where it goes, we focus on comprehensively surveying the tw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
nPAKE^+:A Tree-Based Group Password-Authenticated Key Exchange protocol Using Different Passwords
收藏 引用
Journal of Computer Science & Technology 2009年 第1期24卷 138-151页
作者: 万志国 邓慧杰 鲍丰 Bart Preneel 顾明 Key Laboratory for Information System security Ministry of Education National Laboratory for Information Science and TechnologySchool of SoftwareTsinghua University School of Information Systems Singapore Management UniversitySingapore Institute for Infocomm Research 21 Heng Mui Keng TerraceSingapore K.U.Leuven ESAT/SCDKasteelpark Arenberg 10LeuvenBelgium
Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based grou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 235-244页
作者: Minahil Muhammad Faizan Ayub Khalid Mahmood Saru Kumari Arun Kumar Sangaiah Department of Computer Science COMSATS University Islamabad Sahiwal Campus57000Pakistan Department of Mathematics Ch.Charan Singh UniversityMeerutUtter Paradesh250001India School of Computing Science and Engineering VIT UniversityVelloreTamil NaduIndia
Modem information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical *** this context,the emergence of e-Health clouds offers novel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Improvement ofGNY Logic for the Reflection Attacks
收藏 引用
Journal of Computer Science & Technology 1999年 第6期14卷 619-623页
作者: 丁一强 Laboratory of Computer Sciences Institute of Software Chinese Academy of Sciences Beijing P.R. China
In this paper, the limitation of the GNY logic about its inabilityto detect the reflection attacks against some authentication protocols is given. Animprovement is proposed which takes into account the possible multip... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Secure Short Message Communication protocol
收藏 引用
International Journal of Automation and computing 2008年 第2期5卷 202-207页
作者: Chao-Wen Chang Heng Pan Hong-Yong Jia School of Electronic and Information Engineering Xi~an Jiaotong University Xi'an 710071 PRC Institute of Electronic Technology Information Engineering University Zhengzhou 450004 PRC
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论