Search

Your search keyword '"COMPUTER network protocols"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer network security Remove constraint Topic: computer network security Topic computer security Remove constraint Topic: computer security Topic cryptography Remove constraint Topic: cryptography
9 results on '"COMPUTER network protocols"'

Search Results

1. Fully Deniable Message Authentication Protocols Preserving Confidentiality.

2. Vulnerability of two multiple-key agreement protocols

3. Strongly secure identity-based authenticated key agreement protocols

4. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains.

5. A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption.

6. Abstraction and resolution modulo AC: How to verify Diffie–Hellman-like protocols automatically

7. Non‐interference proof techniques for the analysis of cryptographic protocols.

8. Cryptanalysis of the application secure alternative to SNMP (APSSNMP)

9. Cyberspace Security via Quantum Encryption.

Catalog

Books, media, physical & digital resources