Search

Your search keyword '"COMPUTER network protocols"' showing total 484 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Type News Remove constraint Publication Type: News
484 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. A Messy State of the Union: Taming the Composite State Machines of TLS.

3. On the Origin of Kerberos.

4. Networking Named Content.

5. New design of lightweight authentication protocol in wearable technology.

6. Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link.

7. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

8. A PUF-based hardware mutual authentication protocol.

9. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

10. WiFi Attack Vectors.

11. Wireless Infidelity II: Airjacking.

12. Standards Insecurity.

13. SECURITY FLAWS IN 802.11 DATA LINK PROTOCOLS.

14. Caustic Cookies.

15. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

16. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

17. The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.

18. Cryptanalysis of an identity-based authenticated key exchange protocol.

19. Card-based protocols using unequal division shuffles.

20. Formal verification of a radio network random access protocol.

21. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

22. Mutual authentications to parties with QR-code applications in mobile systems.

23. On probabilistic snap-stabilization.

24. Privacy-enhanced attribute-based private information retrieval.

25. Securing The Commercial Internet.

26. Distributing Trust with the Rampart Toolkit.

27. Securing Cyberspace.

28. Cryptanalysis and Protocol Failures.

29. A Randomized Protocol for Signing Contracts.

30. Timestamps in Keys Distribution Protocols.

31. On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.

32. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model.

33. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

34. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

35. Comparison of group key establishment protocols.

36. An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security.

37. Design of optical fiber communication network monitoring and detection system based on address resolution protocol cheats.

38. Fault-tolerant symmetrically-private information retrieval.

39. Private and oblivious set and multiset operations.

40. Combinatorial Methods in Security Testing.

41. Flow-Based Network Management: A Report from the IRTF NMRG Workshop.

42. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation.

43. Designing and Modeling of Covert Channels in Operating Systems.

44. Security of a semi-quantum protocol where reflections contribute to the secret key.

45. Novel Duplicate Address Detection with Hash Function.

46. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

47. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

48. Bioinspired Security Analysis of Wireless Protocols.

49. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

50. Formal analysis of privacy in Direct Anonymous Attestation schemes.

Catalog

Books, media, physical & digital resources