共 36 条
[21]
Robust Pre-Authentication Protocol for Wireless Network
[J].
2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO),
2017,
:331-336
[23]
Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
[J].
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT),
2019,
[24]
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
[J].
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST),
2012,
:1060-1064
[29]
A Train-ground Security Authentication Scheme Based on Anonymous Proxy Signature for LTE-R System
[J].
Tiedao Xuebao/Journal of the China Railway Society,
2020, 42 (03)
:76-84
[30]
Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management
[J].
IEEE ACCESS,
2024, 12
:78173-78192