Search

Your search keyword '"COMPUTER network protocols"' showing total 82 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer security Remove constraint Topic: computer security Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
82 results on '"COMPUTER network protocols"'

Search Results

1. On probabilistic snap-stabilization.

2. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

3. Privacy-enhanced attribute-based private information retrieval.

4. Formal analysis of privacy in Direct Anonymous Attestation schemes.

5. Optimistic fair exchange in the enhanced chosen-key model.

6. Secure Hamming distance based record linkage with malicious adversaries.

7. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.

8. Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.

9. Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors.

10. Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.

11. A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols.

12. Multi-recastable e-bidding game with dual-blindness.

13. Deciding equivalence-based properties using constraint solving.

14. New attacks and security model of the secure flash disk.

15. Secret handshake scheme with request-based-revealing

16. A hijacker’s guide to communication interfaces of the trusted platform module

17. A new efficient authenticated multiple-key exchange protocol from bilinear pairings.

18. An efficient conditionally anonymous ring signature in the random oracle model

19. Authentication protocol using an identifier in an ad hoc network environment

20. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

21. On cryptographic protocols employing asymmetric pairings — The role of revisited

22. An efficient dynamic authenticated key exchange protocol with selectable identities

23. Contracts for security adaptation

24. Provably secure server-aided verification signatures

25. Certificateless public key encryption: A new generic construction and two pairing-free schemes

26. Efficient identity-based authenticated multiple key exchange protocol

27. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications

28. A novel group key agreement protocol for wireless mesh network

29. Vulnerability of two multiple-key agreement protocols

30. Analysis and improvement of an authenticated multiple key exchange protocol

31. Strongly secure identity-based authenticated key agreement protocols

32. I2CSec: A secure serial Chip-to-Chip communication protocol

33. Non-repudiation analysis using LySa with annotations

34. Advanced smart card based password authentication protocol

35. A dynamic privacy model for web services

36. Analysis of Handover Key Management schemes under IETF perspective

37. Random effects logistic regression model for anomaly detection

38. Digital rights management for multimedia content over 3G mobile networks

39. Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca

40. IEEE 802.11 user fingerprinting and its applications for intrusion detection

41. Revisiting WiMAX MBS security

42. A universal access control method based on host identifiers for Future Internet

43. Basing cryptographic protocols on tamper-evident seals

44. Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures

45. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

46. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

47. Efficient and provably secure password-based group key agreement protocol

48. A key management protocol with robust continuity for sensor networks

49. Access delay in LonTalk MAC protocol

50. Generating routing table for free roaming mobile agent in distributed environment

Catalog

Books, media, physical & digital resources