您当前的位置:
首页 >
文章列表页 >
SSMCI:verification mechanism for security protocols centered on the attacker
Correspondences | 更新时间:2024-06-05
    • SSMCI:verification mechanism for security protocols centered on the attacker

    • Journal on Communications   Vol. 38, Issue 10, Pages: 175-188(2017)
    • DOI:10.11959/j.issn.1000-436x.2017208    

      CLC: TP393.08
    • Online First:2017-10

      Published:25 October 2017

    移动端阅览

  • Wen GU, Ji-hong HAN, Lin YUAN. SSMCI:verification mechanism for security protocols centered on the attacker[J]. Journal on Communications, 2017, 38(10): 175-188. DOI: 10.11959/j.issn.1000-436x.2017208.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1754

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Survey on privacy protection indoor positioning
Formal modeling and security analysis method of security protocol based on CPN
Security analysis of security protocol Swift implementations based on computational model
Adjusted automata learning algorithm for security protocol adaptive model checking

Related Author

SU Chunhua
FENG Tao
ZHENG Lu
Yanyan XU
Zhiheng WANG
Jinze DU
Tao FENG
Xiang GONG

Related Institution

School of Computer and Communication, Lanzhou University of Technology
Division of Computer Science, University of Aizu
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University
College of Computer Science,South Central University For Nationalities
Information Security Research Center of State Key Laboratory of Integrated Services Networks,Xidian University
0