Search

Your search keyword '"COMPUTER network protocols"' showing total 3 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication Remove constraint Topic: authentication Topic client/server computing Remove constraint Topic: client/server computing Topic computer security Remove constraint Topic: computer security
3 results on '"COMPUTER network protocols"'

Search Results

1. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

2. Server-less RFID authentication and searching protocol with enhanced security.

3. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.

Catalog

Books, media, physical & digital resources