Search

Your search keyword '"COMPUTER network protocols"' showing total 7 results
7 results on '"COMPUTER network protocols"'

Search Results

1. Efficient identity-based authenticated multiple key exchange protocol

2. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications

3. Analysis and improvement of an authenticated multiple key exchange protocol

4. Strongly secure identity-based authenticated key agreement protocols

5. Advanced smart card based password authentication protocol

6. Verifying security protocols with PVS: widening the rank function approach

7. Authentication in Transient Storage Device Attachments.

Catalog

Books, media, physical & digital resources