Search

Your search keyword '"COMPUTER network protocols"' showing total 17 results
17 results on '"COMPUTER network protocols"'

Search Results

1. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

2. An efficient dynamic authenticated key exchange protocol with selectable identities

3. Efficient identity-based authenticated multiple key exchange protocol

4. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications

5. Analysis and improvement of an authenticated multiple key exchange protocol

6. Strongly secure identity-based authenticated key agreement protocols

7. I2CSec: A secure serial Chip-to-Chip communication protocol

8. Advanced smart card based password authentication protocol

9. A universal access control method based on host identifiers for Future Internet

10. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

11. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

12. Efficient and provably secure password-based group key agreement protocol

13. Potential weaknesses of AuthA password-authenticated key agreement protocols

14. Verifying security protocols with PVS: widening the rank function approach

15. Secure SAS-like password authentication schemes

16. Provably secure three-party password-based authenticated key exchange protocol

17. Simulatable certificateless two-party authenticated key agreement protocol

Catalog

Books, media, physical & digital resources