8 results on '"COMPUTER network protocols"'
Search Results
2. Password-Based Authentication: Preventing Dictionary Attacks.
3. Securing Wi-Fi Networks.
4. Protecting Privacy in Remote-Patient Monitoring.
5. Authentication in Transient Storage Device Attachments.
6. Simplifying Public Key Management.
7. Scientists Develop New Digital-Content Protection Technology.
8. Securing the ZigBee Protocol in the Smart Grid.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.