Search

Your search keyword '"COMPUTER network protocols"' showing total 279 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer security Remove constraint Topic: computer security
279 results on '"COMPUTER network protocols"'

Search Results

151. Provably secure three-party password-based authenticated key exchange protocol

152. An ideal multi-secret sharing scheme based on MSP

153. Encryption and Secure Computer Networks.

154. Using CSP to Detect Errors in the TMN Protocol.

155. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties.

156. A Model for Secure Protocols and Their Compositions.

157. A secure collaboration service for dynamic virtual organizations

158. Simulatable certificateless two-party authenticated key agreement protocol

159. Selling multiple secrets to a single buyer

160. An improved identity-based key agreement protocol and its security proof

161. Simulatability and security of certificateless threshold signatures

162. Security weakness in a three-party pairing-based protocol for password authenticated key exchange

163. A novel deniable authentication protocol using generalized ElGamal signature scheme

164. The New Standard-Bearer.

165. Wireless Network Configuration and Security Strategies.

166. Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol

167. Cryptanalysis of the application secure alternative to SNMP (APSSNMP)

168. Authentication in Transient Storage Device Attachments.

169. Simplifying Public Key Management.

170. A Generic Framework for Accountable Optimistic Fair Exchange Protocol †.

171. UNPLUGGED AND INSECURE.

172. The Perils of Port 80.

173. NEW IP ADDRESS SYSTEM VS. PRIVACY.

174. INTERNET SABOTAGE.

175. Parameterized Communication.

176. SSH Kerberos Authentication Using GSSAPI and SSPI.

177. BROADCOM UNVEILS PROCESSORS THAT COMBINE PROTOCOL PROCESSING.

178. 10 Steps SOA.

179. West Point UNWIRED.

180. PacketCable Security.

181. ESTIMATORS IN CRYPTOGRAPHIC MODELS.

182. Modelling IEEE 802.15.6 slotted Aloha in heterogeneous condition.

183. IP Security Protocols.

184. Researchers Reveal Critical KRACK Flaws in WPA WiFi Security.

185. Computing: Secure the Internet.

186. Scientists Develop New Digital-Content Protection Technology.

187. Making the Mobile Internet Secure.

188. Preface.

189. CAVIUM NETWORKS UNVEILS OCTEON XL ACCELERATOR CARDS.

190. SSL or IPSec? Or both?

191. VPNs AND THE iPAD.

192. Explicit Communication Revisited: Two New Attacks on Authentication Protocols.

193. OAuth is the 'hottest thing' in identity management.

194. Let's Encrypt Free Certificates' Success Challenges SSL/TLS Industry.

195. Where In The World Is lPv6?

196. Pay heed to 802.11n security.

197. UWB over power line IC offers speedy option.

198. Paranoia: The Best Defense Against E-Mail Attacks.

199. Web application security lockdown.

200. Web services edged forward.

Catalog

Books, media, physical & digital resources