Search

Your search keyword '"COMPUTER network protocols"' showing total 11 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication (law) Remove constraint Topic: authentication (law) Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal computer standards & interfaces Remove constraint Journal: computer standards & interfaces
11 results on '"COMPUTER network protocols"'

Search Results

1. Preventing delegation-based mobile authentications from man-in-the-middle attacks

2. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations

3. Advanced smart card based password authentication protocol

4. Two improved two-party identity-based authenticated key agreement protocols

5. Efficient and provably secure password-based group key agreement protocol

6. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards

7. USIM-based EAP-TLS authentication protocol for wireless local area networks

8. A secure dynamic ID based remote user authentication scheme for multi-server environment

9. Potential weaknesses of AuthA password-authenticated key agreement protocols

10. Secure SAS-like password authentication schemes

11. Efficient deniable authentication protocol based on generalized ElGamal signature scheme

Catalog

Books, media, physical & digital resources