[1] |
QIANG Xiaohui, CHEN Bo, CHEN Guokai.
Analysis and detection for HeartBleed vulnerability of OpenSSL
[J]. Computer Engineering and Applications, 2016, 52(9): 88-95.
|
[2] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[3] |
HU Xiaohui1, CHEN Huili1, SHI Guangtian2, CHEN Yong1.
Formal modeling and verification of CTCS-4 security protocol
[J]. Computer Engineering and Applications, 2014, 50(4): 81-85.
|
[4] |
YU Lei, WEI Shimin.
Analysis on properties for principals’ keys on construction of test components
[J]. Computer Engineering and Applications, 2013, 49(6): 114-117.
|
[5] |
SUN Peiyong, LIU Yining, LI Yajun.
Public verifiable security electronic lottery protocol
[J]. Computer Engineering and Applications, 2013, 49(13): 68-70.
|
[6] |
FAN Yutao1, SU Guiping2.
Formal analysis method suitable to security protocols with timestamp
[J]. Computer Engineering and Applications, 2012, 48(36): 116-120.
|
[7] |
YAO Huazhen1, LIU Chuanju1, LI Xiaomin2.
Authentication protocol based on AES and NTRU for RFID
[J]. Computer Engineering and Applications, 2012, 48(35): 80-84.
|
[8] |
YE Jun1,2,DING Yong1,LIU Yining1.
E-lottery scheme based on verifiable random function
[J]. Computer Engineering and Applications, 2011, 47(33): 71-73.
|
[9] |
DENG Fan1,DENG Shaofeng1,ZHANG Wenzheng2.
Standardized design of security protocols
[J]. Computer Engineering and Applications, 2011, 47(18): 122-126.
|
[10] |
WANG Tao,WANG Li-bin,MA Chang-she.
Design and implementation of generic high efficient RFID authorization protocol model
[J]. Computer Engineering and Applications, 2010, 46(4): 72-75.
|
[11] |
FENG Yong1,LIANG Hao2.
Efficient anonymous authentication scheme in VANETs
[J]. Computer Engineering and Applications, 2010, 46(23): 126-128.
|
[12] |
WU Chang1,XIAO Mei-hua1,LUO Min2,LIU Qiao-wei1,XIONG Hao1.
Effective automatic generation of security protocol’s verification model
[J]. Computer Engineering and Applications, 2010, 46(2): 79-82.
|
[13] |
LI Ting-yuan1,2,QIN Zhi-guang1,LIU Xiao-dong2,ZHANG Xuan-fang2.
Formal analysis of Needham-Schroeder protocol with authentication test methods
[J]. Computer Engineering and Applications, 2010, 46(19): 100-102.
|
[14] |
CHEN Li,GUO Qing-pu.
New compound electronic commerce security protocol
[J]. Computer Engineering and Applications, 2010, 46(11): 14-17.
|
[15] |
LI Yuan-jie1,2,GAO Wei-xun1,YANG Fan1,CAO Qi-ying3.
Research on broadcast security protocol of ubiquitous computing
[J]. Computer Engineering and Applications, 2009, 45(19): 34-36.
|