Search

Your search keyword '"COMPUTER network protocols"' showing total 3 results
3 results on '"COMPUTER network protocols"'

Search Results

1. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

2. Server-less RFID authentication and searching protocol with enhanced security.

3. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.

Catalog

Books, media, physical & digital resources