Search

Your search keyword '"COMPUTER network protocols"' showing total 28 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
28 results on '"COMPUTER network protocols"'

Search Results

1. Accountable Private Set Cardinality for Distributed Measurement.

2. Analyzing Security Protocols with Secrecy Types and Logic Programs.

3. Fireflies: A Secure and Scalable Membership and Gossip Service.

4. A Novel Memristor-Based Hardware Security Primitive.

5. Security Analysis of Accountable Anonymity in Dissent.

6. Inductive study of confidentiality: for everyone.

7. Abstractions of non-interference security: probabilistic versus possibilistic.

8. Formal verification of security protocol implementations: a survey.

9. Safe abstractions of data encodings in formal security protocol models.

10. Verification across Intellectual Property Boundaries.

11. Window Brokers: Collaborative Display Space Control.

13. Privacy-Preserving Distributed Network Troubleshooting--Bridging the Gap between Theory and Practice.

14. Practical Defenses Against Pollution Attacks in Wireless Network Coding.

15. Lightweight RFID Authentication with Forward and Backward Security.

16. Access Controls for Oblivious and Anonymous Systems.

17. One Step Forward: Linking Wireless Self-Organizing Network Validation Techniques with Formal Testing Approaches.

18. Enforcing Access Control in Web-Based Social Networks.

19. Complexity Results for Security Protocols with Diffie-Hellman Exponentiation and Commuting Public Key Encryption.

20. Controlled Physical Random Functions and Applications.

21. On Interdomain Routing Security and Pretty Secure BGP (psBGP).

22. APSS: Proactive Secret Sharing in Asynchronous Systems.

23. The Concept of Layered Proving Trees and Its Application to the Automation of Security Protocol Verification.

24. On the Performance of Group Key Agreement Protocols.

25. A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP).

26. Tree-Based Group Key Agreement.

27. A Secure and Private System for Subscription-Based Remote Services.

28. Encryption and Secure Computer Networks.

Catalog

Books, media, physical & digital resources