Search

Your search keyword '"COMPUTER network protocols"' showing total 79 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal computer standards & interfaces Remove constraint Journal: computer standards & interfaces Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
79 results on '"COMPUTER network protocols"'

Search Results

1. The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example.

2. Survey on link layer congestion management of lossless switching fabric.

3. Optimistic protocol for certified electronic mail with verifiable TTP.

4. A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.

5. Distributed control system for ship engines using dual fieldbus.

6. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

7. J3 Model: A novel framework for improved Modified Condition/Decision Coverage analysis.

8. Recursive and ad hoc routing based localization in wireless sensor networks.

9. Shared RFID ownership transfer protocols.

10. Mutual authentication in self-organized VANETs.

11. Secure Tropos framework for software product lines requirements engineering.

12. Location service and session mobility for streaming media applications in home networks.

13. A collaborative protocol for anonymous reporting in vehicular ad hoc networks.

14. Performance evaluation of the parallel processing producer–distributor–consumer network architecture.

15. The costs and benefits of combining different IP mobility standards

16. Enhancing DSR maintenance with power awareness

17. An interoperability standard for certified mail systems

18. Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

19. Preventing delegation-based mobile authentications from man-in-the-middle attacks

20. Modelling and analysing congestion in KNXnet/IP

21. Design and implementation of a Secure Bandwidth Broker Discovery Protocol

22. Performance analysis and verification of safety communication protocol in train control system

23. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations

24. Feasibility analysis of hybrid control networks based on common industrial protocol

25. Application of structured document parsing to focused web crawling

26. A generic simulation model for evaluating concurrency control protocols in native XML database systems

27. Integrating service discovery technologies in OSGi platform

28. A dynamic privacy model for web services

29. Advanced smart card based password authentication protocol

30. Analysis of Handover Key Management schemes under IETF perspective

31. Proposed corrections to the IEC 61131-3 standard

32. Two improved two-party identity-based authenticated key agreement protocols

33. Efficient and provably secure password-based group key agreement protocol

34. A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas

35. Sdl2pml — Tool for automated generation of Promela model from SDL specification

36. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards

37. A key management protocol with robust continuity for sensor networks

38. A root-based strategy for constructing a clustered MANET in all-IP networks

39. Access delay in LonTalk MAC protocol

40. A privacy problem on Hu–Huang's proxy key generation protocol

41. Generating routing table for free roaming mobile agent in distributed environment

42. A conference key agreement protocol with fault-tolerant capability

43. An analysis of conformance issues in implementations of standardized security protocols

44. Secure and efficient group key management with shared key derivation

45. USIM-based EAP-TLS authentication protocol for wireless local area networks

46. Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system

47. MPLS over ATM and IP over ATM methods for multimedia applications

48. A controllable and accountable state-oriented Card-Aided Firewall

49. A secure dynamic ID based remote user authentication scheme for multi-server environment

50. Privacy and forensics investigation process: The ERPINA protocol

Catalog

Books, media, physical & digital resources