Search

Your search keyword '"COMPUTER network protocols"' showing total 13 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Language undetermined Remove constraint Language: undetermined
13 results on '"COMPUTER network protocols"'

Search Results

1. A game theoretic trust model for on-line distributed evolution of cooperation inMANETs

2. Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials]

3. Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks

4. Modeling and detecting attacks against key agreement protocols

5. Security analysis of session initiation protocol

6. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

7. A Security Framework for JXTA-Overlay

8. Security analysis of two fair exchange protocols

9. Trust relationships in exchange protocols

11. A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters

12. RIAPPA: a robust identity assignment protocol for P2P overlays

13. Ağ üzerinden yavaşlama tabanlı anomali tespiti

Catalog

Books, media, physical & digital resources