共 100 条
[91]
Radomirovic S., 2010, P 1 INT WORKSH SEC I, P6
[92]
Rashid A, 2015, 2015 12TH INTERNATIONAL CONFERENCE ON HIGH-CAPACITY OPTICAL NETWORKS AND ENABLING/EMERGING TECHNOLOGIES (HONET), P80
[94]
Tomasin S, 2017, IEEE WIREL COMMUNN
[96]
Whitman M. E., 2011, Principles of Information security
[97]
Security Vulnerabilities in LoRaWAN
[J].
2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020),
2018,
:129-140
[99]
Younes H. L. S., 2002, Computer Aided Verification. 14th International Conference, CAV 2002. Proceedings (Lecture Notes in Computer Science Vol.2404), P223
[100]
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
[J].
IEEE ACCESS,
2020, 8
:23674-23688