看法等
发表于 2025-3-28 14:46:45
http://reply.papertrans.cn/24/2331/233010/233010_41.png
GULLY
发表于 2025-3-28 20:59:56
http://reply.papertrans.cn/24/2331/233010/233010_42.png
sebaceous-gland
发表于 2025-3-29 02:58:22
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networksmpersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.
紧张过度
发表于 2025-3-29 05:45:03
Conference proceedings 2018Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as
ULCER
发表于 2025-3-29 10:13:36
http://reply.papertrans.cn/24/2331/233010/233010_45.png
Torrid
发表于 2025-3-29 14:01:57
http://reply.papertrans.cn/24/2331/233010/233010_46.png
障碍物
发表于 2025-3-29 16:17:33
http://reply.papertrans.cn/24/2331/233010/233010_47.png
周兴旺
发表于 2025-3-29 22:43:59
http://reply.papertrans.cn/24/2331/233010/233010_48.png
CROW
发表于 2025-3-30 00:14:56
https://doi.org/10.1007/978-3-319-95165-2artificial intelligence; cloud computing; computer networks; data communication systems; data security; i
OVERT
发表于 2025-3-30 04:40:12
978-3-319-95164-5Springer International Publishing AG, part of Springer Nature 2018