Search

Your search keyword '"COMPUTER network protocols"' showing total 303 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
303 results on '"COMPUTER network protocols"'

Search Results

1. On the Origin of Kerberos.

2. New design of lightweight authentication protocol in wearable technology.

3. Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link.

4. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

5. A PUF-based hardware mutual authentication protocol.

6. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

7. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

8. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

9. The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.

10. Cryptanalysis of an identity-based authenticated key exchange protocol.

11. Card-based protocols using unequal division shuffles.

12. Formal verification of a radio network random access protocol.

13. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

14. Mutual authentications to parties with QR-code applications in mobile systems.

15. On probabilistic snap-stabilization.

16. On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.

17. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model.

18. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

19. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

20. Comparison of group key establishment protocols.

21. An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security.

22. Design of optical fiber communication network monitoring and detection system based on address resolution protocol cheats.

23. Fault-tolerant symmetrically-private information retrieval.

24. Private and oblivious set and multiset operations.

25. Combinatorial Methods in Security Testing.

26. Flow-Based Network Management: A Report from the IRTF NMRG Workshop.

27. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation.

28. Designing and Modeling of Covert Channels in Operating Systems.

29. Security of a semi-quantum protocol where reflections contribute to the secret key.

30. Novel Duplicate Address Detection with Hash Function.

31. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

32. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

33. Bioinspired Security Analysis of Wireless Protocols.

34. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

35. Formal analysis of privacy in Direct Anonymous Attestation schemes.

36. A Quantum Single Sign-On Protocol Based on GHZ States.

37. Vulnerability aware graphs for RFID protocol security benchmarking.

38. A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors.

39. Fireflies: A Secure and Scalable Membership and Gossip Service.

40. The Internet Design Tension between Surveillance and Security.

41. Safeguarding 5G wireless communication networks using physical layer security.

42. Optimistic fair exchange in the enhanced chosen-key model.

43. Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories.

44. An efficient client-client password-based authentication scheme with provable security.

45. Tuning a two-round group key agreement.

46. A BSP algorithm for on-the-fly checking CTL* formulas on security protocols.

47. Secure Hamming distance based record linkage with malicious adversaries.

48. Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.

49. Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol.

50. StatVerif: Verification of stateful processes.

Catalog

Books, media, physical & digital resources