Search

Your search keyword '"COMPUTER network protocols"' showing total 28 results
28 results on '"COMPUTER network protocols"'

Search Results

1. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

2. Novel Duplicate Address Detection with Hash Function.

3. Survey on network-based botnet detection methods.

4. Multi-recastable e-bidding game with dual-blindness.

5. ECC Based IKE Protocol Design for Internet Applications.

6. An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation.

7. IEEE 802.11 user fingerprinting and its applications for intrusion detection

8. Secure Internet Access to Gateway Using Secure Socket Layer.

9. Host Mobility for IP Networks: A Comparison.

10. Protecting Privacy in Remote-Patient Monitoring.

11. Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC.

12. A novel deniable authentication protocol using generalized ElGamal signature scheme

13. A Holistic Approach to Security Policies – Policy Distribution with XACML over COPS.

14. Automated Security Protocol Analysis With the AVISPA Tool.

15. NEW IP ADDRESS SYSTEM VS. PRIVACY.

16. Comparison of different ways to avoid internet traffic interception

17. IP Security Protocols.

18. Paranoia: The Best Defense Against E-Mail Attacks.

19. Traceback of DDoS Attacks Using Entropy Variations.

20. DrayTek Vigor2600G.

21. Insecure on security.

22. Can PPTP really go it alone?

23. Security gap looms for Internet architects.

24. BORDER PATROL.

25. Internet Technology Flaws RaiseFears of DoS Attacks.

26. Next Step In Affordable Security.

27. Cisco warns of flaws in OpenSSL software.

28. Money Problem.

Catalog

Books, media, physical & digital resources