Search

Your search keyword '"COMPUTER network protocols"' showing total 85 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer security Remove constraint Topic: computer security Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
85 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. The Criteria for Adapting a Blockchain Consensus Algorithm to IoT Networks †.

3. MQTT TABANLI IOT SİSTEMİNE YAPILAN SALDIRILARIN MAKİNE ÖĞRENİMİ KULLANILARAK TESPİTİ.

4. A Messy State of the Union: Taming the Composite State Machines of TLS.

5. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

6. A PUF-based hardware mutual authentication protocol.

7. Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming.

8. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

9. Internet Protocol (IP) Steganography Using Modified Particle Swarm Optimization (MPSO) Algorithm.

10. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

11. Development of the ECAT Preprocessor with the Trust Communication Approach.

12. Global Behavior of a Computer Virus Propagation Model on Multilayer Networks.

13. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

14. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning.

15. Electronic institutions and neural computing providing law-compliance privacy for trusting agents.

16. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

17. Detection and Prevention of Cybersecurity Risks of Cloud-connected Machinery in Industrial Internet of Things System (IIoT)

18. On probabilistic snap-stabilization.

19. Improved Identification Protocol in the Quantum Random Oracle Model.

20. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model.

21. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

22. Comparison of group key establishment protocols.

23. Efficient private subset computation.

24. Provably secure user authentication and key agreement scheme for wireless sensor networks.

25. Multi-proxy multi-signature binding positioning protocol.

26. Combinatorial Methods in Security Testing.

27. Privacy-enhanced attribute-based private information retrieval.

28. Mecanismes de connectivitat remota: creació d'una VPN basada en wireguard i integració amb mecanismes d'autenticació

29. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.

30. A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox.

31. Designing and Modeling of Covert Channels in Operating Systems.

32. Novel Duplicate Address Detection with Hash Function.

33. A Lightweight Security Protocol for NFC-based Mobile Payments.

34. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

35. Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks.

36. Topology-Hiding Broadcast Based on NTRUEncrypt.

37. Orthus v2 Authentication Protocol Enhancement, and Supporting Enterprise Architecture.

38. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

39. Analysis on the Performance of Server-less RFID Searching Protocol.

40. Formal analysis of privacy in Direct Anonymous Attestation schemes.

41. Securing Voice Call Transmission over Cellular Communication.

42. Secure Internet Voting Protocol (SIVP): a secure option for electoral processes

43. Cybersecurity: You Cannot Secure What You Cannot See.

44. Vulnerability aware graphs for RFID protocol security benchmarking.

45. An efficient strongly secure authenticated key exchange protocol without random oracles.

46. Safeguarding 5G wireless communication networks using physical layer security.

47. An enhanced Kerberos protocol with non-interactive zero-knowledge proof.

48. Optimistic fair exchange in the enhanced chosen-key model.

49. Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks.

50. A Traceable Optimistic Fair Exchange Protocol in the Standard Model.

Catalog

Books, media, physical & digital resources