共 50 条
- [41] Security Improvement of Portable Key Management Using a Mobile Phone COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 148 - 159
- [42] A Key Management Scheme for Security and Energy Efficiency in Sensor Networks JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 223 - 231
- [43] Key management requirments for Positive Train Control communications security Proceedings of the 2006 Joint Rail Conference on Restoring and Upgrading Rail Infrastructure, Rolling Stock and Systems, 2006, 31 : 253 - 262
- [45] SECURITY AND PRIVACY FOR SMART GRID USING SCALABLE KEY MANAGEMENT 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 4716 - 4721
- [46] Security Assessment for Key Management in Mobile Ad Hoc Networks INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
- [47] IoT Devices with Non-interactive Key Management Protocol 2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
- [49] Research on Large-scale Authentication Architecture and Key Management Protocol Based on Combined Symmetric Key 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 367 - 370
- [50] A Machine-Checked Proof of Security for AWS Key Management Service PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 63 - 78