Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference17 articles.
1. Aiash M. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurr Comput Pract Exp. http://dx.doi.org/10.1002/cpe.3260.
2. Aiash M. A novel security protocol for address resolving in the location/ID split architecture. In: Network and system security NSS2013, vol. 7873; 2013. p. 68–79.
3. Baker H, Stradling R, Farrell S, Kutscher D, Ohlman B. The named information (NI) URI scheme: optional features, Technical Report, Network Working Group; 2012. URL 〈http://tools.ietf.org/html/draft-hallambaker-decade-ni-params-03〉.
4. A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment;Chen;J Netw Comput Appl,2014
5. Dannewitz C, Golic J, Ohlman B, Ahlgren B. Secure naming for a network of information. In: INFOCOM; 2010. p. 1–6. http://dx.doi.org/10.1109/INFCOMW.2010.5466661.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献