Search

Your search keyword '"COMPUTER network protocols"' showing total 36 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
36 results on '"COMPUTER network protocols"'

Search Results

1. Cryptanalysis of an identity-based authenticated key exchange protocol.

2. Fast and efficient probing of heterogeneous IoT networks.

3. Formal verification of a radio network random access protocol.

4. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

5. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

6. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.

7. Scalable, privacy preserving radio-frequency identification protocol for the internet of things.

8. Internet and business ethics.

9. DECT.

10. A multilevel taxonomy and requirements for an optimal traffic-classification model.

11. Linguistic security testing for text communication protocols.

12. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.

13. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.

14. A fault-tolerant group key agreement protocol exploiting dynamic setting.

15. Dual cryptography authentication protocol and its security analysis for radio frequency identification systems.

16. Practical attacks and improvements to an efficient radio frequency identification authentication protocol.

17. Cryptanalysis of an efficient three-party password-based key exchange scheme.

18. Server-less RFID authentication and searching protocol with enhanced security.

19. On 'a simple three-party password-based key exchange protocol'.

20. A hidden mutual authentication protocol for low-cost RFID tags.

21. A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.

22. VoIP secure session assistance and call monitoring via building security gateway.

23. Efficient three-party password-based key exchange scheme.

24. A Robust Mutual Authentication Protocol for Wireless Sensor Networks.

25. Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices.

26. A simple three-party password-based key exchange protocol.

27. Reliable and efficient multicast protocol for mobile IP networks.

28. An access protocol for urgent traffic in wireless networks enhanced with ad hoc networking.

29. Node mobility protocols in the Internet.

30. An implementation and verification of a hierarchical architecture for IP traceback.

31. Synchronous CSMA/CD on PTMP access networks.

32. Multi-hour design of survivable classical IP networks.

33. Communication Protocols with Untraceability of Sender and Receiver.

34. Security Flaws in Authentication Protocols with Anonymity for Wireless Environments.

35. Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks.

36. Modelling IEEE 802.15.6 slotted Aloha in heterogeneous condition.

Catalog

Books, media, physical & digital resources