Search

Your search keyword '"COMPUTER network protocols"' showing total 11 results
11 results on '"COMPUTER network protocols"'

Search Results

1. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

2. Robust Multi-Factor Authentication for Fragile Communications.

3. Keylogging-Resistant Visual Authentication Protocols.

4. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

5. Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography.

6. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

7. A Comment on "MABS: Multicast Authentication Based on Batch Signature”.

8. Securing the ZigBee Protocol in the Smart Grid.

10. An efficient and scalable re-authentication protocol over wireless sensor network.

11. The F_f-Family of Protocols for RFID-Privacy and Authentication.

Catalog

Books, media, physical & digital resources