看法等 发表于 2025-3-28 14:46:45
http://reply.papertrans.cn/24/2331/233010/233010_41.pngGULLY 发表于 2025-3-28 20:59:56
http://reply.papertrans.cn/24/2331/233010/233010_42.pngsebaceous-gland 发表于 2025-3-29 02:58:22
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networksmpersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.紧张过度 发表于 2025-3-29 05:45:03
Conference proceedings 2018Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such asULCER 发表于 2025-3-29 10:13:36
http://reply.papertrans.cn/24/2331/233010/233010_45.pngTorrid 发表于 2025-3-29 14:01:57
http://reply.papertrans.cn/24/2331/233010/233010_46.png障碍物 发表于 2025-3-29 16:17:33
http://reply.papertrans.cn/24/2331/233010/233010_47.png周兴旺 发表于 2025-3-29 22:43:59
http://reply.papertrans.cn/24/2331/233010/233010_48.pngCROW 发表于 2025-3-30 00:14:56
https://doi.org/10.1007/978-3-319-95165-2artificial intelligence; cloud computing; computer networks; data communication systems; data security; iOVERT 发表于 2025-3-30 04:40:12
978-3-319-95164-5Springer International Publishing AG, part of Springer Nature 2018