您当前的位置:
首页 >
文章列表页 >
Security analysis of security protocol Swift implementations based on computational model
Papers | 更新时间:2024-06-05
    • Security analysis of security protocol Swift implementations based on computational model

    • Journal on Communications   Vol. 39, Issue 9, Pages: 178-190(2018)
    • DOI:10.11959/j.issn.1000-436x.2018165    

      CLC: TP309
    • Online First:2018-09

      Published:25 September 2018

    移动端阅览

  • Bo MENG, Xudong HE, Jinli ZHANG, et al. Security analysis of security protocol Swift implementations based on computational model[J]. Journal on Communications, 2018, 39(9): 178-190. DOI: 10.11959/j.issn.1000-436x.2018165.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1827

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Formal modeling and security analysis method of security protocol based on CPN
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Analysis and improvement of the BACnet/IP based on identity authentication
Survey on privacy protection indoor positioning
SSMCI:verification mechanism for security protocols centered on the attacker

Related Author

Xiang GONG
Jinze DU
Tao FENG
SU Chunhua
FENG Tao
ZHENG Lu
Jiafeng ZHU
Yongping KANG

Related Institution

School of Computer and Communication, Lanzhou University of Technology
Division of Computer Science, University of Aizu
School of Mechanical and Electrical Engineering, Lanzhou University of Technology
School of Computer and Communications, Lanzhou University of Technology
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University
0