Search

Your search keyword '"COMPUTER network protocols"' showing total 1,283 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security
1,283 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. The Criteria for Adapting a Blockchain Consensus Algorithm to IoT Networks †.

4. Accountable Private Set Cardinality for Distributed Measurement.

5. MQTT TABANLI IOT SİSTEMİNE YAPILAN SALDIRILARIN MAKİNE ÖĞRENİMİ KULLANILARAK TESPİTİ.

6. マスタリングTCP/IP. 情報セキュリティ編

7. A Messy State of the Union: Taming the Composite State Machines of TLS.

8. A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems.

9. Security Certificates in Public Web Sites of Banks from Balkan States.

10. Analyzing Security Protocols with Secrecy Types and Logic Programs.

11. On the Origin of Kerberos.

12. マスタリングTCP/IP -情報セキュリティ編-

13. New design of lightweight authentication protocol in wearable technology.

14. Formally analyzed m-coupon protocol with confirmation code (MCWCC).

15. Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link.

16. A PUF-based hardware mutual authentication protocol.

17. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

18. Networking Named Content.

19. Cryptographic Protocol : Security Analysis Based on Trusted Freshness

20. Everlasting Multi-party Computation.

21. Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming.

22. Internet Protocol (IP) Steganography Using Modified Particle Swarm Optimization (MPSO) Algorithm.

23. On the Feasibility of Extending Oblivious Transfer.

24. Fast Garbling of Circuits Under Standard Assumptions.

25. Detection and Prevention of Cybersecurity Risks of Cloud-connected Machinery in Industrial Internet of Things System (IIoT)

26. WiFi Attack Vectors.

27. Wireless Infidelity II: Airjacking.

28. Standards Insecurity.

29. SECURITY FLAWS IN 802.11 DATA LINK PROTOCOLS.

30. Caustic Cookies.

31. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

32. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

33. The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.

34. Cryptanalysis of an identity-based authenticated key exchange protocol.

35. Card-based protocols using unequal division shuffles.

36. Formal verification of a radio network random access protocol.

37. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

38. Mutual authentications to parties with QR-code applications in mobile systems.

39. On probabilistic snap-stabilization.

40. Privacy-enhanced attribute-based private information retrieval.

41. Development of the ECAT Preprocessor with the Trust Communication Approach.

42. Global Behavior of a Computer Virus Propagation Model on Multilayer Networks.

43. An Improvement Over Lee et al.'s Key Agreement Protocol.

44. Fast and efficient probing of heterogeneous IoT networks.

45. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning.

46. Electronic institutions and neural computing providing law-compliance privacy for trusting agents.

47. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.

48. TAPCS: Traffic-aware pseudonym changing strategy for VANETs.

49. Securing The Commercial Internet.

50. Distributing Trust with the Rampart Toolkit.

Catalog

Books, media, physical & digital resources