Search

Your search keyword '"COMPUTER network protocols"' showing total 279 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer security Remove constraint Topic: computer security
279 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. A Messy State of the Union: Taming the Composite State Machines of TLS.

3. Networking Named Content.

4. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

5. A PUF-based hardware mutual authentication protocol.

6. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

7. WiFi Attack Vectors.

8. Wireless Infidelity II: Airjacking.

9. Standards Insecurity.

10. SECURITY FLAWS IN 802.11 DATA LINK PROTOCOLS.

11. Caustic Cookies.

12. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

13. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

14. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

15. On probabilistic snap-stabilization.

16. Privacy-enhanced attribute-based private information retrieval.

17. Securing The Commercial Internet.

18. Distributing Trust with the Rampart Toolkit.

19. Securing Cyberspace.

20. Cryptanalysis and Protocol Failures.

21. A Randomized Protocol for Signing Contracts.

22. Timestamps in Keys Distribution Protocols.

23. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model.

24. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

25. Comparison of group key establishment protocols.

26. Combinatorial Methods in Security Testing.

27. Designing and Modeling of Covert Channels in Operating Systems.

28. Novel Duplicate Address Detection with Hash Function.

29. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.

30. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

31. Formal analysis of privacy in Direct Anonymous Attestation schemes.

32. Vulnerability aware graphs for RFID protocol security benchmarking.

33. Safeguarding 5G wireless communication networks using physical layer security.

34. Optimistic fair exchange in the enhanced chosen-key model.

35. An efficient client-client password-based authentication scheme with provable security.

36. A BSP algorithm for on-the-fly checking CTL* formulas on security protocols.

37. Secure Hamming distance based record linkage with malicious adversaries.

38. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.

39. Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.

40. On the Efficiency of Classical and Quantum Secure Function Evaluation.

41. Clone wars: Distributed detection of clone attacks in mobile WSNs.

42. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

43. Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors.

44. Model checking quantum Markov chains.

45. Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.

46. Multi-recastable e-bidding game with dual-blindness.

47. A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols.

48. Deciding equivalence-based properties using constraint solving.

49. New attacks and security model of the secure flash disk.

50. NAPADI NA IEEE802.11 BEŽIČNE MREŽE.

Catalog

Books, media, physical & digital resources