共 50 条
- [41] Algebra model and security analysis for cryptographic protocols Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [42] Security Evaluation Over Lightweight Cryptographic Protocols 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
- [45] A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 386 - 400
- [47] Detecting collusion attacks in security protocols FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
- [48] Desynchronization attacks on RFID security protocols Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
- [50] Analyzing cryptographic protocols to strengthen HR information security JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (08): : 2495 - 2509