Search

Your search keyword '"COMPUTER network protocols"' showing total 15 results

Search Constraints

Start Over You searched for: "COMPUTER network protocols" Remove constraint "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Language undetermined Remove constraint Language: undetermined
15 results on '"COMPUTER network protocols"'

Search Results

1. Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials]

2. A survey of covert channels and countermeasures in computer network protocols

3. A game theoretic trust model for on-line distributed evolution of cooperation inMANETs

4. Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks

5. Modeling and detecting attacks against key agreement protocols

6. Security analysis of session initiation protocol

7. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

8. A Security Framework for JXTA-Overlay

9. Security analysis of two fair exchange protocols

10. Trust relationships in exchange protocols

12. A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters

13. RIAPPA: a robust identity assignment protocol for P2P overlays

14. Ağ üzerinden yavaşlama tabanlı anomali tespiti

15. Protocol testing methdology development at NBS

Catalog

Books, media, physical & digital resources