Search

Your search keyword '"COMPUTER network protocols"' showing total 753 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publication Type Newspapers Remove constraint Publication Type: Newspapers
753 results on '"COMPUTER network protocols"'

Search Results

1. The Criteria for Adapting a Blockchain Consensus Algorithm to IoT Networks †.

2. Accountable Private Set Cardinality for Distributed Measurement.

3. MQTT TABANLI IOT SİSTEMİNE YAPILAN SALDIRILARIN MAKİNE ÖĞRENİMİ KULLANILARAK TESPİTİ.

4. A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems.

5. Analyzing Security Protocols with Secrecy Types and Logic Programs.

6. New design of lightweight authentication protocol in wearable technology.

7. Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link.

8. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

9. Everlasting Multi-party Computation.

10. On the Origin of Kerberos.

11. A PUF-based hardware mutual authentication protocol.

12. Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming.

13. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

14. Fast Garbling of Circuits Under Standard Assumptions.

15. On the Feasibility of Extending Oblivious Transfer.

16. Internet Protocol (IP) Steganography Using Modified Particle Swarm Optimization (MPSO) Algorithm.

17. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

18. Development of the ECAT Preprocessor with the Trust Communication Approach.

19. Global Behavior of a Computer Virus Propagation Model on Multilayer Networks.

20. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

21. The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.

22. Cryptanalysis of an identity-based authenticated key exchange protocol.

23. Card-based protocols using unequal division shuffles.

24. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning.

25. An Improvement Over Lee et al.'s Key Agreement Protocol.

26. Fast and efficient probing of heterogeneous IoT networks.

27. Formal verification of a radio network random access protocol.

28. Electronic institutions and neural computing providing law-compliance privacy for trusting agents.

29. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

30. Mutual authentications to parties with QR-code applications in mobile systems.

31. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.

32. On probabilistic snap-stabilization.

33. TAPCS: Traffic-aware pseudonym changing strategy for VANETs.

34. Improved Identification Protocol in the Quantum Random Oracle Model.

35. On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.

36. Survey on UAANET Routing Protocols and Network Security Challenges.

37. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model.

38. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

39. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

40. Comparison of group key establishment protocols.

41. Design of optical fiber communication network monitoring and detection system based on address resolution protocol cheats.

42. An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security.

43. Efficient private subset computation.

44. Provably secure user authentication and key agreement scheme for wireless sensor networks.

45. Multi-proxy multi-signature binding positioning protocol.

46. Fault-tolerant symmetrically-private information retrieval.

47. Private and oblivious set and multiset operations.

48. Combinatorial Methods in Security Testing.

49. A Trajectory Privacy Model for Radio-Frequency Identification System.

50. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.

Catalog

Books, media, physical & digital resources