55 results on '"security protocol"'
Search Results
2. Security and Privacy issue in Telemedicine: Issues, Solutions, and Standards
3. Novel Experimental Prototype for Determining Malicious Degree in Vulnerable Environment of Internet-of-Things
4. Modelling a Fair-Exchange Protocol in the Presence of Misbehaviour Using PEPA
5. Comparative Analysis of Security Protocols in IoT
6. Novel Secure Scheme for On-Field Sensors for Data Aggregation in Precision Agriculture
7. A Modeling and Verification Framework for Security Protocols
8. Survey on Access Control Models Feasible in Cyber-Physical Systems
9. A Secure Key Management Technique Through Distributed Middleware for the Internet of Things
10. A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model
11. Research on K-Means Clustering Algorithm Over Encrypted Data
12. Graphene: A Secure Cloud Communication Architecture
13. Non-monotonic Security Protocols and Failures in Financial Intermediation
14. : Walking the Privacy Trail
15. Automatic Verification of Security of OpenID Connect Protocol with ProVerif
16. Two-Way Authentication for the Internet-of-Things
17. Securing the Internet of Things
18. A Role-Based Access Control System for Intelligent Buildings
19. FDR: From Theory to Industrial Application
20. A Brief History of Security Protocols
21. SpaceSecLab: A Representative, Modular Environment for Prototyping and Testing Space-Link Security Protocols End to End
22. On Attacker Models and Profiles for Cyber-Physical Systems
23. Performance Modelling of Optimistic Fair Exchange
24. Guided Specification and Analysis of a Loyalty Card System
25. Automated Verification of Timed Security Protocols with Clock Drift
26. SPEC: An Equivalence Checker for Security Protocols
27. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions
28. Security and Privacy of Protocols and Software with Formal Methods
29. Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications
30. A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN)
31. Key-Secrecy of PACE with OTS/CafeOBJ
32. The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)
33. Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods
34. Checking Trace Equivalence: How to Get Rid of Nonces?
35. Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems
36. Verifying Parameterized Timed Security Protocols
37. A Framework for Analyzing Verifiability in Traditional and Electronic Exams
38. Automatic Verification for Later-Correspondence of Security Protocols
39. Secure Improved Cloud-Based RFID Authentication Protocol
40. Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID
41. Analysis of Multilevel Framework for Cloud Security
42. Security Goals and Evolving Standards
43. A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
44. Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)
45. Formal Analysis of DAA-Related APIs in TPM 2.0
46. A Hybrid Analysis for Security Protocols with State
47. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
48. Electronic Voting: How Logic Can Help
49. Knowledge-Based Automated Repair of Authentication Protocols
50. Automated Formal Verification of Application-specific Security Properties
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.