Search

Your search keyword '"COMPUTER network protocols"' showing total 17 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Journal communications of the acm Remove constraint Journal: communications of the acm
17 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. A Messy State of the Union: Taming the Composite State Machines of TLS.

3. Networking Named Content.

4. WiFi Attack Vectors.

5. Wireless Infidelity II: Airjacking.

6. Standards Insecurity.

7. SECURITY FLAWS IN 802.11 DATA LINK PROTOCOLS.

8. Caustic Cookies.

9. Securing The Commercial Internet.

10. Distributing Trust with the Rampart Toolkit.

11. Securing Cyberspace.

12. Cryptanalysis and Protocol Failures.

13. A Randomized Protocol for Signing Contracts.

14. Timestamps in Keys Distribution Protocols.

15. The Perils of Port 80.

16. NEW IP ADDRESS SYSTEM VS. PRIVACY.

17. INTERNET SABOTAGE.

Catalog

Books, media, physical & digital resources