Search

Your search keyword '"COMPUTER network protocols"' showing total 17 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Journal international journal of communication systems Remove constraint Journal: international journal of communication systems Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
17 results on '"COMPUTER network protocols"'

Search Results

1. Cryptanalysis of an identity-based authenticated key exchange protocol.

2. Formal verification of a radio network random access protocol.

3. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

4. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

5. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.

6. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.

7. A fault-tolerant group key agreement protocol exploiting dynamic setting.

8. Cryptanalysis of an efficient three-party password-based key exchange scheme.

9. Server-less RFID authentication and searching protocol with enhanced security.

10. On 'a simple three-party password-based key exchange protocol'.

11. A hidden mutual authentication protocol for low-cost RFID tags.

12. VoIP secure session assistance and call monitoring via building security gateway.

13. Efficient three-party password-based key exchange scheme.

14. A simple three-party password-based key exchange protocol.

15. Reliable and efficient multicast protocol for mobile IP networks.

16. Multi-hour design of survivable classical IP networks.

17. Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks.

Catalog

Books, media, physical & digital resources