Search

Your search keyword '"COMPUTER network protocols"' showing total 11 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer network architectures Remove constraint Topic: computer network architectures Topic computer network security Remove constraint Topic: computer network security Topic computer security Remove constraint Topic: computer security
11 results on '"COMPUTER network protocols"'

Search Results

1. The Hierarchical Network Security Protocols Designing based on Public Key.

2. Dynamic Routing with Security Considerations.

3. EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol.

4. Information Leak Vulnerabilities in SIP Implementations.

5. Using SAML to Protect the Session Initiation Protocol (SIP).

6. On Information System Security Architecture.

7. NECESSITY OF NEW LAYERED APPROACH TO NETWORK SECURITY.

8. Proactive Security for VoIP Networks.

9. Can VoIP Secure Itself for the Next Technology Wave?

10. Tunnel.

11. Next Step In Affordable Security.

Catalog

Books, media, physical & digital resources