Search

Your search keyword '"COMPUTER network protocols"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication Remove constraint Topic: authentication Topic client/server computing Remove constraint Topic: client/server computing
9 results on '"COMPUTER network protocols"'

Search Results

1. A robust ElGamal-based password-authentication protocol using smart card for client-server communication.

2. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.

3. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

4. Server-less RFID authentication and searching protocol with enhanced security.

5. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.

6. A communication-efficient three-party password authenticated key exchange protocol

7. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.

8. AMY: Use your cell phone to create a protected personal network over devices.

9. A secure control protocol for USB mass storage devices.

Catalog

Books, media, physical & digital resources