Search

Your search keyword '"COMPUTER network protocols"' showing total 5 results
5 results on '"COMPUTER network protocols"'

Search Results

1. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.

2. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks.

3. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

4. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.

5. A secure control protocol for USB mass storage devices.

Catalog

Books, media, physical & digital resources