Search

Your search keyword '"COMPUTER network protocols"' showing total 6 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication Remove constraint Topic: authentication Topic client/server computing Remove constraint Topic: client/server computing Topic protocols Remove constraint Topic: protocols
6 results on '"COMPUTER network protocols"'

Search Results

1. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.

2. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks.

3. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

4. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.

5. AMY: Use your cell phone to create a protected personal network over devices.

6. A secure control protocol for USB mass storage devices.

Catalog

Books, media, physical & digital resources