Search

Your search keyword '"COMPUTER network protocols"' showing total 11 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication Remove constraint Topic: authentication Topic computer security Remove constraint Topic: computer security Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
11 results on '"COMPUTER network protocols"'

Search Results

1. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

2. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

3. Mutual authentications to parties with QR-code applications in mobile systems.

4. Provably secure user authentication and key agreement scheme for wireless sensor networks.

5. A Lightweight Security Protocol for NFC-based Mobile Payments.

6. Orthus v2 Authentication Protocol Enhancement, and Supporting Enterprise Architecture.

7. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

8. Analysis on the Performance of Server-less RFID Searching Protocol.

9. An enhanced Kerberos protocol with non-interactive zero-knowledge proof.

10. Robust Multi-Factor Authentication for Fragile Communications.

11. Keylogging-Resistant Visual Authentication Protocols.

Catalog

Books, media, physical & digital resources