Search

Your search keyword '"COMPUTER network protocols"' showing total 5 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer networks Remove constraint Topic: computer networks Topic computer security Remove constraint Topic: computer security Journal journal of computer security Remove constraint Journal: journal of computer security
5 results on '"COMPUTER network protocols"'

Search Results

1. A derivation system and compositional logic for security protocols.

2. A formal model of rational exchange and its application to the analysis of Syverson's protocol.

3. Embedding agents within the intruder to detect parallel attacks.

4. Polynomial liveness.

5. Some attacks upon authenticated group key agreement protocols.

Catalog

Books, media, physical & digital resources