Search

Your search keyword '"COMPUTER network protocols"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic authentication (law) Remove constraint Topic: authentication (law) Topic computer network security Remove constraint Topic: computer network security Topic computer security Remove constraint Topic: computer security
9 results on '"COMPUTER network protocols"'

Search Results

1. Efficient identity-based authenticated multiple key exchange protocol

2. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications

3. Analysis and improvement of an authenticated multiple key exchange protocol

4. Strongly secure identity-based authenticated key agreement protocols

5. Advanced smart card based password authentication protocol

6. Verifying security protocols with PVS: widening the rank function approach

7. SIMULATION BASED VALIDATION OF AUTHENTICATION PROTOCOLS.

8. Authentication in Transient Storage Device Attachments.

9. SSH Kerberos Authentication Using GSSAPI and SSPI.

Catalog

Books, media, physical & digital resources