×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [8]
贵州大学 [1]
软件研究所 [1]
内容类型
会议论文 [5]
期刊论文 [5]
发表日期
2016 [1]
2015 [1]
2014 [1]
2012 [3]
2011 [1]
2010 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Secure content delivery scheme based on yaksha system for CCMANETs
期刊论文
Journal of Communications, 2016, 卷号: 11, 期号: 2, 页码: 221-230
作者:
Guo, Xian
;
Feng, Tao
;
Fang, Jun-Li
;
Wang, Jing
;
Lu, Ye
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Mobile security
CCN/NDN
Content deliverly
Content-centric networkings
Future internet architecture
MANET
Protocol composition logic
Secure content deliveries
Yaksha
A new method of formalizing anonymity based on protocol composition logic
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 期号: 6, 页码: 1132-1140
作者:
Feng, Tao
;
Han, Shining
;
Guo, Xian
;
Ma, Donglin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
PCL
anonymity
equivalent messages
equivalent traces
DAA
基于可信芯片的平台身份证明方案研究
期刊论文
通信学报, 2014, 卷号: 35, 期号: 8, 页码: 95-106
张倩颖
;
冯登国
;
赵世军
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2014/12/16
可信计算
平台身份证明
协议组合逻辑
匿名性
trusted computing
platform identity attestation
protocol composition logic
anonymity
Secure access authentication scheme for 4G wireless network based on PCL
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 4, 页码: 77-84
作者:
Wang, Li-Li
;
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
4G mobile communication systems
Authentication
Computer circuits
Computer terminals
Cryptography
Mobile telecommunication systems
Network security
Wireless networks
4G wireless networks
Access authentications
Authentication protocols
Comprehensive analysis
Protocol composition logic
Protocol derivation systems
Security attributes
Selfcertified public key
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Jiao, Jian
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Authentication
Computation theory
Computer circuits
Cryptography
Heterogeneous networks
Information management
Mobile security
Wireless local area networks (WLAN)
Access authentications
Authentication protocols
Comprehensive analysis
Identity based cryptographs
Man in the middle attacks
Mutual authentication
Protocol composition logic
WAPI
Secure re-authentication scheme for 3G-WLAN integrating network based on protocol composition logic
会议论文
Nanjing, China, August 11, 2012 - August 13, 2012
作者:
Feng, Tao
;
Chen, Hui
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Internet protocols
Mobile security
Wireless local area networks (WLAN)
3G-WLAN
Authentication algorithm
EAP-AKA
Integrating networks
Parallel composition
Protocol composition logic
Re authentications
Re-authentication protocols
Secure authenticated key agreement protocol for WMEN based on protocol composition logic
会议论文
作者:
Feng, Tao
;
Yi, Yangfan
;
Ma, Jianfeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Authentication
Computer crime
Public key cryptography
Authentication key agreement protocols
Forward-secure
Protocol composition logic
Protocol derivation systems
WMEN
Security authentication protocol for WiMAX wireless network based on protocol composition logic
期刊论文
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 卷号: 32, 期号: 9, 页码: 2106-2111
作者:
Feng, Tao
;
Z.-B., Zhang
;
J.-F., Ma
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Authentication
Computer circuits
IEEE Standards
Internet protocols
Interoperability
Mobile security
Wimax
Wireless networks
Authentication protocols
Formal correctness
IEEE 802.16e-2005
Network applications
Protocol composition logic
Protocol derivation systems
Security authentication
WiMAX(worldwide interoperability for microwave access)
Extension and application of Protocol Composition Logic
会议论文
Chengdu, China, April 16, 2010 - April 18, 2010
作者:
You, Ziyi
;
Li, JunTao
;
Xie, Xiaoyao
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
Formal analysis of improved EAP-AKA based on protocol composition logic
会议论文
作者:
Liu, Peng
;
Zhou, Peng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Authentication
3G-WLAN
EAP-AKA
Formal analysis
New protocol
Protocol composition logic
Replay attack
Security analysis
Sequential rule
©版权所有 ©2017 CSpace - Powered by
CSpace