Search

Your search keyword '"COMPUTER network protocols"' showing total 84 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer network security Remove constraint Topic: computer network security Topic computer security Remove constraint Topic: computer security
84 results on '"COMPUTER network protocols"'

Search Results

1. Networking Named Content.

2. SECURITY FLAWS IN 802.11 DATA LINK PROTOCOLS.

3. Securing The Commercial Internet.

4. Design of optical fiber communication network monitoring and detection system based on address resolution protocol cheats.

5. Establishing and preserving protocol security goals.

6. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

7. Anonymous attestation with user-controlled linkability.

8. Authentication protocol using an identifier in an ad hoc network environment

9. Fully Deniable Message Authentication Protocols Preserving Confidentiality.

10. Efficient identity-based authenticated multiple key exchange protocol

11. Vulnerability of two multiple-key agreement protocols

12. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications

13. A novel group key agreement protocol for wireless mesh network

14. Analysis and improvement of an authenticated multiple key exchange protocol

15. Strongly secure identity-based authenticated key agreement protocols

16. Privacy in Non-private Environments.

17. Development of a test suite for the verification of implementations of the IPsec v2 security protocol.

18. Advanced smart card based password authentication protocol

19. Private key agreement and secure communication for heterogeneous sensor networks

20. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains.

21. The principle of guarantee availability for security protocol analysis.

22. Gateway Selection Protocol in Hybrid MANET Using DYMO Routing.

23. A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption.

24. E2-SCAN: an extended credit strategy-based energy-efficient security scheme for wireless ad hoc networks.

25. Dynamic Routing with Security Considerations.

26. An analysis of conformance issues in implementations of standardized security protocols

27. Secure and efficient group key management with shared key derivation

28. Investigating the Performance of Power-Aware IEEE 802.11 in Multihop Wireless Networks.

29. Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.

30. Privacy and forensics investigation process: The ERPINA protocol

31. Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks.

32. Analysis of probabilistic contract signing.

33. Using SAML to Protect the Session Initiation Protocol (SIP).

34. Information Leak Vulnerabilities in SIP Implementations.

35. Security analysis of a password-based authentication protocol proposed to IEEE 1363

36. Abstraction and resolution modulo AC: How to verify Diffie–Hellman-like protocols automatically

37. Verifying security protocols with PVS: widening the rank function approach

38. Techniques for improving the security and manageability of IPsec policy.

39. Non‐interference proof techniques for the analysis of cryptographic protocols.

40. Relating multiset rewriting and process algebras for security protocol analysis.

41. Decidability of context‐explicit security protocols.

42. SIMULATION BASED VALIDATION OF AUTHENTICATION PROTOCOLS.

43. An implementation and verification of a hierarchical architecture for IP traceback.

44. Types and effects for asymmetric cryptographic protocols.

45. Multiset rewriting and the complexity of bounded security protocols.

46. NECESSITY OF NEW LAYERED APPROACH TO NETWORK SECURITY.

47. Encryption and Secure Computer Networks.

48. An improved identity-based key agreement protocol and its security proof

49. Cryptanalysis of the application secure alternative to SNMP (APSSNMP)

50. Authentication in Transient Storage Device Attachments.

Catalog

Books, media, physical & digital resources