Funder
Science and Engineering Research Board
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, Springer, pp 281–285
2. Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January)
3. Ashton K, et al. (2009) That internet of things thing. RFID J 22(7):97–114
4. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 139–155
5. Chang CC, Chang SC, Yang JH (2013) A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur Commun Netw 6(8):972–984
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献