共 50 条
- [22] Some applications of polynomials for the design of cryptographic protocols SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
- [23] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks 2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
- [24] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
- [25] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
- [26] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
- [28] Research Progress in Semi-Quantum Cryptographic Protocols Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2024, 47 (06): : 18 - 23