Search

Your search keyword '"COMPUTER network protocols"' showing total 303 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
303 results on '"COMPUTER network protocols"'

Search Results

51. On the Efficiency of Classical and Quantum Secure Function Evaluation.

52. Clone wars: Distributed detection of clone attacks in mobile WSNs.

53. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants.

54. Man-in-the-middle attack on quantum secure communications with authentication.

55. On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

56. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

57. Trojan horse attack free fault-tolerant quantum key distribution protocols.

58. COIN FLIPPING WITH CONSTANT BIAS IMPLIES ONE-WAY FUNCTIONS.

59. Establishing and preserving protocol security goals.

60. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

61. Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors.

62. Abstractions of non-interference security: probabilistic versus possibilistic.

63. Formal verification of security protocol implementations: a survey.

64. Safe abstractions of data encodings in formal security protocol models.

65. Inductive study of confidentiality: for everyone.

66. Security Weaknesses in Arbitrated Quantum Signature Protocols.

67. Model checking quantum Markov chains.

68. The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform.

69. Space delay-tolerant network secure communication model.

70. A NEW DETECTION STRATEGY FOR TWO-STEP QSDC PROTOCOL BASED ON THE FIVE-PARTICLE CLUSTER STATE.

71. A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS.

72. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

73. Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.

74. Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using Entanglement Swapping.

75. Secure Quantum Dialogue Protocol Based on W States Without Information Leakage.

76. Multi-recastable e-bidding game with dual-blindness.

77. Practical dynamic group signature with efficient concurrent joins and batch verifications.

78. Deciding equivalence-based properties using constraint solving.

79. New attacks and security model of the secure flash disk.

80. Anonymous attestation with user-controlled linkability.

81. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.

82. NAPADI NA IEEE802.11 BEŽIČNE MREŽE.

83. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.

84. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

85. A hijacker’s guide to communication interfaces of the trusted platform module

86. Secret handshake scheme with request-based-revealing

87. A fault-tolerant group key agreement protocol exploiting dynamic setting.

88. A survey on security issues and solutions at different layers of Cloud computing.

89. A new efficient authenticated multiple-key exchange protocol from bilinear pairings.

90. R-MAC: Risk-Aware Dynamic MAC Protocol for Vehicular Cooperative Collision Avoidance System.

91. Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks.

92. Increasing the security of the ping-pong protocol by using many mutually unbiased bases.

93. An inter-bank E-payment protocol based on quantum proxy blind signature.

94. Quantum private comparison protocol with d-dimensional Bell states.

95. An efficient conditionally anonymous ring signature in the random oracle model

96. Cryptanalysis of an efficient three-party password-based key exchange scheme.

97. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.

98. Two-way and one-way quantum cryptography protocols

99. IMPROVEMENT OF ONE QUANTUM ENCRYPTION SCHEME.

100. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.

Catalog

Books, media, physical & digital resources