看法等 发表于 2025-3-28 14:46:45

http://reply.papertrans.cn/24/2331/233010/233010_41.png

GULLY 发表于 2025-3-28 20:59:56

http://reply.papertrans.cn/24/2331/233010/233010_42.png

sebaceous-gland 发表于 2025-3-29 02:58:22

Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networksmpersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.

紧张过度 发表于 2025-3-29 05:45:03

Conference proceedings 2018Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as

ULCER 发表于 2025-3-29 10:13:36

http://reply.papertrans.cn/24/2331/233010/233010_45.png

Torrid 发表于 2025-3-29 14:01:57

http://reply.papertrans.cn/24/2331/233010/233010_46.png

障碍物 发表于 2025-3-29 16:17:33

http://reply.papertrans.cn/24/2331/233010/233010_47.png

周兴旺 发表于 2025-3-29 22:43:59

http://reply.papertrans.cn/24/2331/233010/233010_48.png

CROW 发表于 2025-3-30 00:14:56

https://doi.org/10.1007/978-3-319-95165-2artificial intelligence; cloud computing; computer networks; data communication systems; data security; i

OVERT 发表于 2025-3-30 04:40:12

978-3-319-95164-5Springer International Publishing AG, part of Springer Nature 2018
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computational Science and Its Applications – ICCSA 2018; 18th International C Osvaldo Gervasi,Beniamino Murgante,Yeonseung Ryu Conference p