Font Size: a A A
Keyword [protocol composition logic]
Result: 1 - 13 | Page: 1 of 1
1. Research And Design Of Authentication Security Infrastructure Of WLAN
2. The Formal Analysis Methods Of Wireless Network Security Protocol
3. Design And Analysis Of Security Authentication Protocols
4. Research On RFID Tag Ownership Transfer Mechanism
5. An Authentication Protocol For RFID Privacy Protection And Its Application Research
6. Research On WiMAX Wireless Network Access Security Technology
7. Research On Secure Access Technology For 4G Wireless Network
8. Research On Authenticated Key Agreement Scheme For WLAN Mesh
9. Research On 3G-WLAN Interworking Access Security
10. Secure Access Authentication Scheme For3G-WLAN Heterogeneous Network Based On WAPI
11. Study On Theory And Applications Of Security Protocols Formal Analysis
12. Design And Formal Analysis Of TPM-based Protocols For IaaS And SaaS
13. Formal analysis of security protocols: Protocol composition logic
  <<First  <Prev  Next>  Last>>  Jump to