共 17 条
- [1] Al-Hawawreh Muna, 2021, X-IIoTID: A Connectivityand Device-agnostic Intrusion Dataset for Industrial Internet of Things, DOI [10.21227/mpb6-py55, DOI 10.21227/MPB6-PY55]
- [2] Amutha S, 2020, INT CONF ADVAN COMPU, P1086, DOI [10.1109/icaccs48705.2020.9074443, 10.1109/ICACCS48705.2020.9074443]
- [3] Berner Noah, 2022, Breaking security protocols with a quantum computer
- [4] Bruvoll S., 2020, IEEE CONF COMM NETW, P1, DOI [10.1109/CNS48642.2020.9162227, DOI 10.1109/cns48642.2020.9162227]
- [5] WIP: An Onion-Based Routing Protocol Strengthening Anonymity [J]. 2021 IEEE 22ND INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2021), 2021, : 231 - 235
- [7] When Blockchain Meets Edge Intelligence: Trusted and Security Solutions for Consumers [J]. IEEE NETWORK, 2021, 35 (05): : 272 - 278
- [9] Network Security Implementation by Onion Routing [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 339 - 342
- [10] Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication [J]. IEEE ACCESS, 2022, 10 : 80352 - 80364