Browse by Journal
![]() | See full list of headings |
C
Cheng, Zhaohui and Chen, Liqun (2007) On security proof of McCullagh Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2 (3-4) . pp. 251-259. ISSN 1747-8405 [Article] (doi:10.1504/IJSN.2007.013178)
E
Edris, Ed Kamya Kiyemba, Aiash, Mahdi ORCID: https://orcid.org/0000-0002-3984-6244, Loo, Jonathan and Alhakeem, Mohammad Shadi
(2021)
Formal verification of secondary authentication protocol for 5G secondary authentication.
International Journal of Security and Networks, 16
(4)
.
pp. 223-234.
ISSN 1747-8405
[Article]
(doi:10.1504/IJSN.2021.119379)
M
Ma, Xiaoqi and Cheng, Xiaochun ORCID: https://orcid.org/0000-0003-0371-9646
(2008)
Verifying security protocols by knowledge analysis.
International Journal of Security and Networks, 3
(3)
.
pp. 183-192.
ISSN 1747-8405
[Article]
(doi:10.1504/IJSN.2008.020092)