Zobrazeno 1 - 10
of 1 210
pro vyhledávání: '"Security protocol"'
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 109-122 (2024)
The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. Given the complex protocol logic,
Externí odkaz:
https://doaj.org/article/9abb701b1094488d8d45d8caba2aac3d
Publikováno v:
Tongxin xuebao, Vol 45, Pp 101-116 (2024)
To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained e
Externí odkaz:
https://doaj.org/article/f6d05fbeb9cc464eb12ca6d7fa815969
Publikováno v:
Dianxin kexue, Vol 40, Pp 146-159 (2024)
AI large model is leading the hot ICT(information and communications technology) industry in the next decade. Intelligent computing center network is a communication base to support the distributed training of AI large model, and it is one of the key
Externí odkaz:
https://doaj.org/article/9ed4a4712dc942038b2c3013542bcb49
Publikováno v:
Applied Sciences, Vol 14, Iss 21, p 9726 (2024)
The rapid evolution of mobile and optical communication technologies is driving the transition from 5G to 6G networks. This transition inevitably brings about changes in authentication scenarios, as new security demands emerge that go beyond the capa
Externí odkaz:
https://doaj.org/article/24fa081014b8461a92e2713266a495a8
Publikováno v:
网络与信息安全学报, Vol 9, Pp 116-126 (2023)
To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of secu
Externí odkaz:
https://doaj.org/article/cd6bbbfb4ea74b859924799e00900d80
Autor:
Zhiheng WANG, Yanyan XU
Publikováno v:
Tongxin xuebao, Vol 44, Pp 188-204 (2023)
Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data i
Externí odkaz:
https://doaj.org/article/841e45485c154d9d80e26213fa012959
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
RFID technology application has made multi label collisions and security privacy issues increasingly prominent in logistics warehousing. A solution that combines RFID and chaotic encryption algorithm has been proposed and applied to anti-collision an
Externí odkaz:
https://doaj.org/article/f4897161833a4770aef82d6efc9729d2
Publikováno v:
IEEE Access, Vol 11, Pp 112438-112450 (2023)
The size of wireless networks and the number of wireless devices are growing daily. A crucial part of wireless security involves preventing unauthorized access by using wireless security protocols in order to protect the data in wireless networks. In
Externí odkaz:
https://doaj.org/article/0a2b66aabc4f4376b439a740d0e7dc80
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.