[1] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[2] |
QIANG Xiaohui, CHEN Bo, CHEN Guokai.
Analysis and detection for HeartBleed vulnerability of OpenSSL
[J]. Computer Engineering and Applications, 2016, 52(9): 88-95.
|
[3] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[4] |
HU Xiaohui1, CHEN Huili1, SHI Guangtian2, CHEN Yong1.
Formal modeling and verification of CTCS-4 security protocol
[J]. Computer Engineering and Applications, 2014, 50(4): 81-85.
|
[5] |
YU Lei, WEI Shimin.
Analysis on properties for principals’ keys on construction of test components
[J]. Computer Engineering and Applications, 2013, 49(6): 114-117.
|
[6] |
FAN Yutao1, SU Guiping2.
Formal analysis method suitable to security protocols with timestamp
[J]. Computer Engineering and Applications, 2012, 48(36): 116-120.
|
[7] |
YAO Huazhen1, LIU Chuanju1, LI Xiaomin2.
Authentication protocol based on AES and NTRU for RFID
[J]. Computer Engineering and Applications, 2012, 48(35): 80-84.
|
[8] |
DENG Fan1,DENG Shaofeng1,ZHANG Wenzheng2.
Standardized design of security protocols
[J]. Computer Engineering and Applications, 2011, 47(18): 122-126.
|
[9] |
WANG Tao,WANG Li-bin,MA Chang-she.
Design and implementation of generic high efficient RFID authorization protocol model
[J]. Computer Engineering and Applications, 2010, 46(4): 72-75.
|
[10] |
FENG Yong1,LIANG Hao2.
Efficient anonymous authentication scheme in VANETs
[J]. Computer Engineering and Applications, 2010, 46(23): 126-128.
|
[11] |
WU Chang1,XIAO Mei-hua1,LUO Min2,LIU Qiao-wei1,XIONG Hao1.
Effective automatic generation of security protocol’s verification model
[J]. Computer Engineering and Applications, 2010, 46(2): 79-82.
|
[12] |
LI Ting-yuan1,2,QIN Zhi-guang1,LIU Xiao-dong2,ZHANG Xuan-fang2.
Formal analysis of Needham-Schroeder protocol with authentication test methods
[J]. Computer Engineering and Applications, 2010, 46(19): 100-102.
|
[13] |
CHEN Li,GUO Qing-pu.
New compound electronic commerce security protocol
[J]. Computer Engineering and Applications, 2010, 46(11): 14-17.
|
[14] |
LI Yuan-jie1,2,GAO Wei-xun1,YANG Fan1,CAO Qi-ying3.
Research on broadcast security protocol of ubiquitous computing
[J]. Computer Engineering and Applications, 2009, 45(19): 34-36.
|
[15] |
ZHANG Chao,HAN Ji-hong,WANG Ya-di,ZHU Yu-na.
Improved first-order logic model for security protocols
[J]. Computer Engineering and Applications, 2008, 44(26): 95-98.
|