Search

Your search keyword '"COMPUTER network protocols"' showing total 29 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication Remove constraint Topic: authentication Topic computer security Remove constraint Topic: computer security
29 results on '"COMPUTER network protocols"'

Search Results

1. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

2. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

3. Mutual authentications to parties with QR-code applications in mobile systems.

4. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.

5. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants.

6. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

7. Establishing and preserving protocol security goals.

8. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

9. A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS.

10. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

11. Server-less RFID authentication and searching protocol with enhanced security.

12. Authentication protocol using an identifier in an ad hoc network environment

13. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

14. Efficient three-party authenticated key agreement protocol in certificateless cryptography.

15. Provably secure and efficient identification and key agreement protocol with user anonymity

16. Advanced smart card based password authentication protocol

17. A universal access control method based on host identifiers for Future Internet

18. ECC-based lightweight authentication protocol with untraceability for low-cost RFID

19. A Key Caching Mechanism for Reducing WiMAX Authentication Cost in Handoff.

20. Secure Authenticated Key Exchange Protocol for Credential Services.

21. Computationally Efficient PKI-Based Single Sign-On Protocol PKASSO for Mobile Devices.

22. Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings

23. On the impossibility of building secure Cliques-type authenticated group key agreement protocols.

24. A Secure Strong-Password Authentication Protocol.

25. Improvement of HWWM-authenticated key agreement protocol

26. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.

27. Explicit Communication Revisited: Two New Attacks on Authentication Protocols.

28. Securing the ZigBee Protocol in the Smart Grid.

29. An efficient and scalable re-authentication protocol over wireless sensor network.

Catalog

Books, media, physical & digital resources