您当前的位置:
首页 >
文章列表页 >
Rational analysis of authentication protocols based on NGUYEN L H scheme
Papers | 更新时间:2024-06-05
    • Rational analysis of authentication protocols based on NGUYEN L H scheme

    • Journal on Communications   Vol. 34, Issue 8, Pages: 18-26(2013)
    • DOI:10.3969/j.issn.1000-436x.2013.08.003    

      CLC: TP311
    • Online First:2013-08

      Published:25 August 2013

    移动端阅览

  • Xing-hua LI, Ling-juan DENG, Yuan ZHANG, et al. Rational analysis of authentication protocols based on NGUYEN L H scheme[J]. Journal on Communications, 2013, 34(8): 18-26. DOI: 10.3969/j.issn.1000-436x.2013.08.003.

  •  
  •  

0

Views

710

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Fairly verifiable multi-user homomorphic proxy re-encryption scheme
Rational-security and fair two-party comparison protocol
Evaluation method of penetrating jamming effectiveness for cognitive communication protection
Active defense technology against intelligent jammer
Network security situational awareness model based on threat intelligence

Related Author

YANG Xun
DING Hongfa
PENG Changgen
HOU Jinqiu
Yao ZHU
Ximeng LIU
Bowen ZHAO
Yang XIAO

Related Institution

Nonlinear Analysis and High-Performance Computing Laboratory, School of Science, Guizhou University of Engineering Science
Key Laboratory of Blockchain and Fintech of Department of Education of Guizhou Province, Guizhou University of Finance and Economics
School of Computer Science and Technology, Guizhou University
College of Management Science and Engineering, Anhui University of Finance & Economics
Xidian University State Key Laboratory of Integrated Service Networks
0