Journal of Surveillance, Security and Safety
All Journals
Search
Log In
Indexing:
CNKI
,
Dimensions
,
Lens
,
Submission to first decision:
35 days
Hot Keywords
Cyber-physical systems
Post-quantum cryptography
Public-key cryptography
Edge computing
Anti-forensics
Big data
security control selection
Attacks on IoT systems
Domain Name System
DNS attacks
Network security
Transport layer security protocol
Home
About
About the Journal
Aims and Scope
Editorial Policies
Editorial Board
Junior Editorial Board
News
Partners
Advertise
Contact Us
Publish with us
For Authors
Author Instructions
Article Processing Charges
Editorial Process
Manuscript Templates
Submit a Manuscript
For Reviewers
Peer Review Guidelines
Articles
All Articles
Articles with Video Abstracts
Video Abstract Guidelines
Special Issues
All Special Issues
Ongoing Special Issues
Completed Special Issues
Closed Special Issue
Special Issue Ebooks
Special Issue Guidelines
Volumes
Pre-onlines
Features
Webinars
Home
Articles
Special Issues
Volumes
Webinars
Videos
Menu
Journal of Surveillance, Security and Safety
Search
Submit
Submission to first decision:
35 days
Home
Articles
Special Issues
Volumes
Webinars
Videos
Menu
Home
Articles
Article
Image
Figure3
From:
Split keys for station-to-station (STS) protocols
Figure 3. Reflection attack against STS-KDF.
Back
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
editorial@jsssjournal.com
Navigation
Contact Us
Sitemap
Follow Us
LinkedIn
Twitter
Navigation
Contact Us
Sitemap
Committee on Publication Ethics
https://publicationethics.org/members/journal-surveillance-security-and-safety
Portico
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/
Committee on Publication Ethics
https://publicationethics.org/members/journal-surveillance-security-and-safety
Portico
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/