Search

Your search keyword '"COMPUTER network protocols"' showing total 22 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
22 results on '"COMPUTER network protocols"'

Search Results

1. Cryptanalysis of an identity-based authenticated key exchange protocol.

2. Formal verification of a radio network random access protocol.

3. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

4. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

5. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.

6. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.

7. A fault-tolerant group key agreement protocol exploiting dynamic setting.

8. Cryptanalysis of an efficient three-party password-based key exchange scheme.

9. Server-less RFID authentication and searching protocol with enhanced security.

10. On 'a simple three-party password-based key exchange protocol'.

11. A hidden mutual authentication protocol for low-cost RFID tags.

12. VoIP secure session assistance and call monitoring via building security gateway.

13. Efficient three-party password-based key exchange scheme.

14. A simple three-party password-based key exchange protocol.

15. Reliable and efficient multicast protocol for mobile IP networks.

16. An access protocol for urgent traffic in wireless networks enhanced with ad hoc networking.

17. Node mobility protocols in the Internet.

18. An implementation and verification of a hierarchical architecture for IP traceback.

19. Synchronous CSMA/CD on PTMP access networks.

20. Multi-hour design of survivable classical IP networks.

21. Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks.

22. Modelling IEEE 802.15.6 slotted Aloha in heterogeneous condition.

Catalog

Books, media, physical & digital resources