Search

Your search keyword '"security protocol"' showing total 1,097 results

Search Constraints

Start Over You searched for: Descriptor "security protocol" Remove constraint Descriptor: "security protocol"
1,097 results on '"security protocol"'

Search Results

101. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge

102. Security analysis of security protocol Swift implementations based on computational model

103. SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.

104. Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection.

105. Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks.

106. Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things".

107. Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication.

108. A qualitative analysis of the feasibility of deploying biometric authentication systems to augment security protocols of bank card transactions.

109. On Attacker Models and Profiles for Cyber-Physical Systems

110. Performance Modelling of Optimistic Fair Exchange

111. Guided Specification and Analysis of a Loyalty Card System

112. Automated Verification of Timed Security Protocols with Clock Drift

113. SPEC: An Equivalence Checker for Security Protocols

114. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions

115. Security and Privacy of Protocols and Software with Formal Methods

117. Security Analysis on “A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems”.

120. Composing Security Protocols: From Confidentiality to Privacy

121. Type-Based Verification of Electronic Voting Protocols

122. Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols

123. Automatically Checking Commitment Protocols in ProVerif without False Attacks

124. Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques

125. Abstractions for Security Protocol Verification

126. Leakiness is Decidable for Well-Founded Protocols

127. The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)

128. Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods

129. Checking Trace Equivalence: How to Get Rid of Nonces?

130. Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems

131. Verifying Parameterized Timed Security Protocols

132. A Framework for Analyzing Verifiability in Traditional and Electronic Exams

133. Automatic Verification for Later-Correspondence of Security Protocols

134. Secure Improved Cloud-Based RFID Authentication Protocol

135. SSMCI:verification mechanism for security protocols centered on the attacker

136. A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs

139. A Novel Design of Flexible Crypto Coprocessor and Its Application

143. Relay-Proof Channels Using UWB Lasers (Transcript of Discussion)

144. Blood in the Water (Transcript of Discussion)

145. Blood in the Water : Are there Honeymoon Effects Outside Software?

146. Caught in the Maze of Security Standards (Transcript of Discussion)

147. Security Design in Human Computation Games (Transcript of Discussion)

148. Security Protocols for Secret Santa (Transcript of Discussion)

149. Virtually Perfect Democracy

150. It’s the Anthropology, Stupid! (Transcript of Discussion)

Catalog

Books, media, physical & digital resources