Search

Your search keyword '"COMPUTER network protocols"' showing total 45 results
45 results on '"COMPUTER network protocols"'

Search Results

1. Combinatorial Methods in Security Testing.

2. Designing and Modeling of Covert Channels in Operating Systems.

3. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

4. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

5. Safeguarding 5G wireless communication networks using physical layer security.

6. On the Efficiency of Classical and Quantum Secure Function Evaluation.

7. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

8. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

9. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.

10. Code Reverse Engineering Problem for Identification Codes.

11. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols.

12. An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation.

13. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains.

14. A Key Caching Mechanism for Reducing WiMAX Authentication Cost in Handoff.

15. Effect of Impulse Radio-Ultrawideband Based on Energy Collection on MAC Protocol Performance.

16. Limited Scale-Free Overlay Topologies for Unstructured Peer-to-Peer Networks.

17. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks.

18. Privacy-Preserving Kth Element Score over Vertically Partitioned Data.

19. Dynamic Routing with Security Considerations.

20. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments.

21. Investigating the Performance of Power-Aware IEEE 802.11 in Multihop Wireless Networks.

22. Computationally Efficient PKI-Based Single Sign-On Protocol PKASSO for Mobile Devices.

23. Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting.

24. Distributed Correlative Power Control Schemes for Mobile Ad hoc Networks Using Directional Antennas.

25. Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks.

26. Password-Based Authentication: Preventing Dictionary Attacks.

27. Information Leak Vulnerabilities in SIP Implementations.

28. Using SAML to Protect the Session Initiation Protocol (SIP).

29. Secure Internet Access to Gateway Using Secure Socket Layer.

30. Securing Wi-Fi Networks.

31. Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN.

32. Host Mobility for IP Networks: A Comparison.

33. Protecting Privacy in Remote-Patient Monitoring.

34. Using CSP to Detect Errors in the TMN Protocol.

35. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties.

36. A Model for Secure Protocols and Their Compositions.

37. The New Standard-Bearer.

38. Authentication in Transient Storage Device Attachments.

39. Simplifying Public Key Management.

40. Scientists Develop New Digital-Content Protection Technology.

41. Explicit Communication Revisited: Two New Attacks on Authentication Protocols.

42. Securing the ZigBee Protocol in the Smart Grid.

43. An efficient and scalable re-authentication protocol over wireless sensor network.

44. Flexible Robust Group Key Agreement.

45. Traceback of DDoS Attacks Using Entropy Variations.

Catalog

Books, media, physical & digital resources