Search

Your search keyword '"COMPUTER network protocols"' showing total 79 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Topic cryptography Remove constraint Topic: cryptography
79 results on '"COMPUTER network protocols"'

Search Results

1. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

2. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

3. Cryptanalysis of an identity-based authenticated key exchange protocol.

4. Card-based protocols using unequal division shuffles.

5. Cryptanalysis and Protocol Failures.

6. Comparison of group key establishment protocols.

7. An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security.

8. Novel Duplicate Address Detection with Hash Function.

9. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

10. Formal analysis of privacy in Direct Anonymous Attestation schemes.

11. Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories.

12. Tuning a two-round group key agreement.

13. Tag Content Access Control with Identity-based Key Exchange.

14. Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol.

15. StatVerif: Verification of stateful processes.

16. On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

17. Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.

18. COIN FLIPPING WITH CONSTANT BIAS IMPLIES ONE-WAY FUNCTIONS.

19. A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS.

20. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

21. Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.

22. Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using Entanglement Swapping.

23. Multi-recastable e-bidding game with dual-blindness.

24. Practical dynamic group signature with efficient concurrent joins and batch verifications.

25. Deciding equivalence-based properties using constraint solving.

26. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.

27. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.

28. Increasing the security of the ping-pong protocol by using many mutually unbiased bases.

29. Server-less RFID authentication and searching protocol with enhanced security.

30. Fully Deniable Message Authentication Protocols Preserving Confidentiality.

31. A hidden mutual authentication protocol for low-cost RFID tags.

32. On cryptographic protocols employing asymmetric pairings — The role of revisited

33. Analysing TLS in the strand spaces model.

34. AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES.

35. Improvement on 'Quantum Key Agreement Protocol with Maximally Entangled States'.

36. An efficient dynamic authenticated key exchange protocol with selectable identities

37. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols.

38. QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY.

39. Vulnerability of two multiple-key agreement protocols

40. Strongly secure identity-based authenticated key agreement protocols

41. BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATION.

42. I2CSec: A secure serial Chip-to-Chip communication protocol

43. Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks.

44. Finite models for formal security proofs.

45. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains.

46. Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures

47. Basing cryptographic protocols on tamper-evident seals

48. A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption.

49. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

50. PROPOSAL OF A SEMIFORMAL MODEL OF ANONYMOUS COMMUNICATION.

Catalog

Books, media, physical & digital resources