Search

Your search keyword '"security protocol"' showing total 1,095 results

Search Constraints

Start Over You searched for: Descriptor "security protocol" Remove constraint Descriptor: "security protocol"
1,095 results on '"security protocol"'

Search Results

1. Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif.

2. IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions

3. Secure system with security protocol for interactions in healthcare Internet of Things.

4. IKEChecker: 语法引导的IKE协议有状态模糊测试.

5. HostSec: A blockchain-based authentication framework for SDN hosts.

6. A Transcendental Number-Based Random Insertion Method for Privacy Protection

7. IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things

8. 3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET

9. Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN

10. 基于数理逻辑的安全协议本征逻辑分析方法.

11. Revolutionary of secure lightweight energy efficient routing protocol for internet of medical things: a review.

12. Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif

14. 5G-based smart airport network security scheme design and security analysis

15. Underwater Confidential Communications in JANUS

17. Survey on privacy protection indoor positioning

18. Anti-Collision and Security Protocol of Logistics Warehouse Labels by Integrating RFID and Chaotic Encryption Algorithm

19. 基于5G 的智慧机场网络安全方案设计与安全性分析.

20. 室内定位隐私保护综述.

21. An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols.

22. A Formal Analysis of the FIDO2 Protocols

25. Wireless Sensor-Based Enhanced Security Protocol to Prevent Node Cloning Attack

26. APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.

27. A Secure IIoT Gateway Architecture based on Trusted Execution Environments.

28. Authentication and Key Agreement Protocol for UAV Communication

29. Secure Modern Wireless Communication Network Based on Blockchain Technology.

30. An enhanced scheme for mutual authentication for healthcare services

31. Security protocol for securing notifications about dangerous events in the agglomeration.

32. Modelling a Fair-Exchange Protocol in the Presence of Misbehaviour Using PEPA

33. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

34. Comparative Analysis of Security Protocols in IoT

35. A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks

38. Study on Resource Monitoring of E-Healthcare System

39. A Modeling and Verification Framework for Security Protocols

40. Secure E-Commerce Scheme

41. A security protocol for D2D communications in 5G networks using elliptic curve cryptography.

42. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT.

43. Secure protocols for smart contract based insurance services.

44. Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV".

45. Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure.

46. User Authentication and Authorization Framework in IoT Protocols.

47. PUF-PSS: A Physically Secure Privacy-Preserving Scheme Using PUF for IoMT-Enabled TMIS.

48. Off-the-Record (OTR) Security Protocol Application in Cloud Environment

49. We Bring Your Identity: A Secure Online Passenger Identity Protocol (SOPIP) for Indian Railways Using Aadhaar Number

50. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

Catalog

Books, media, physical & digital resources