8 results on '"COMPUTER network protocols"'
Search Results
2. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.
3. Two-factor authentication scheme using attribute and password.
4. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
5. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
6. Cryptanalysis of an efficient three-party password-based key exchange scheme.
7. On 'a simple three-party password-based key exchange protocol'.
8. Cryptanalysis of a simple three-party password-based key exchange protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.