Works matching DE "COMPUTER network protocol security measures"
Results: 34
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
- Published in:
- Expert Systems, 2014, v. 31, n. 1, p. 9, doi. 10.1111/j.1468-0394.2012.00652.x
- By:
- Publication type:
- Article
More Efficient Oblivious Transfer Extensions.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 3, p. 805, doi. 10.1007/s00145-016-9236-6
- By:
- Publication type:
- Article
Reconciling Non-malleability with Homomorphic Encryption.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 3, p. 601, doi. 10.1007/s00145-016-9231-y
- By:
- Publication type:
- Article
Design and Development of an Industrial Network Laboratory.
- Published in:
- International Journal of Emerging Technologies in Learning, 2011, v. 6, p. 21, doi. 10.3991/ijet.v6iS1.1615
- By:
- Publication type:
- Article
CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY.
- Published in:
- ICTACT Journal on Communication Technology, 2017, v. 8, n. 2, p. 1533, doi. 10.21917/ijct.2017.0226
- By:
- Publication type:
- Article
Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 10, p. 3827, doi. 10.1007/s11128-015-1083-0
- By:
- Publication type:
- Article
Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 12, p. 4604, doi. 10.3837/tiis.2014.12.021
- By:
- Publication type:
- Article
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1313, doi. 10.3837/tiis.2013.05.021
- By:
- Publication type:
- Article
IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1291, doi. 10.3837/tiis.2013.05.020
- By:
- Publication type:
- Article
Why Didn't We Spot That?
- Published in:
- IEEE Internet Computing, 2010, v. 14, n. 1, p. 84, doi. 10.1109/MIC.2010.21
- By:
- Publication type:
- Article
LTL model-checking for security protocols.
- Published in:
- AI Communications, 2011, v. 24, n. 3, p. 281, doi. 10.3233/aic-2010-0489
- By:
- Publication type:
- Article
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3167, doi. 10.1002/sec.1241
- By:
- Publication type:
- Article
Vulnerabilities of an ECC-based RFID authentication scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3262, doi. 10.1002/sec.1250
- By:
- Publication type:
- Article
A dependable storage service system in cloud environment.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 4, p. 574, doi. 10.1002/sec.1004
- By:
- Publication type:
- Article
An efficient fair UC-secure protocol for two-party computation.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1253, doi. 10.1002/sec.857
- By:
- Publication type:
- Article
An Authentication Protocol for Clustered Wireless Sensor Networks.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 198
- By:
- Publication type:
- Article
Formalization &Analysis of Electronics Voting Protocols by using Applied PI Calculus.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 837
- By:
- Publication type:
- Article
New Variant MultiPrime Jordon Totient--RSA Cryptosystem with one Public key and two Private Keys.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 576
- By:
- Publication type:
- Article
Security Protocol Design: A Case Study Using Key Distribution Protocols.
- Published in:
- Journal of Computer Science & Control Systems, 2009, v. 2, n. 2, p. 16
- By:
- Publication type:
- Article
Model-based mutation testing from security protocols in HLPSL.
- Published in:
- Software Testing: Verification & Reliability, 2015, v. 25, n. 5-7, p. 684, doi. 10.1002/stvr.1531
- By:
- Publication type:
- Article
A Security Adaptation Reference Monitor for Wireless Sensor Network.
- Published in:
- ISRN Communications & Networking, 2012, p. 1, doi. 10.5402/2012/528374
- By:
- Publication type:
- Article
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1816462
- By:
- Publication type:
- Article
An improved and provably secure privacy preserving authentication protocol for SIP.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 1, doi. 10.1007/s12083-015-0400-9
- By:
- Publication type:
- Article
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 2, p. 216, doi. 10.1007/s12083-014-0251-9
- By:
- Publication type:
- Article
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 5, p. 301, doi. 10.1007/s10207-011-0133-6
- By:
- Publication type:
- Article
Specifying and implementing privacy-preserving cryptographic protocols.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 6, p. 395, doi. 10.1007/s10207-008-0057-y
- By:
- Publication type:
- Article
Bayesian rational exchange.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 1, p. 85, doi. 10.1007/s10207-007-0039-5
- By:
- Publication type:
- Article
Identity-based key agreement protocols from pairings.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 4, p. 213, doi. 10.1007/s10207-006-0011-9
- By:
- Publication type:
- Article
Modeling analysis of server loading in large-scale P2P-VoD systems with actively collaborative helpers.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 3, p. 215, doi. 10.1007/s11235-013-9729-7
- By:
- Publication type:
- Article
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
FIXING THE loT PROBLEM.
- Published in:
- ITNOW, 2017, v. 59, n. 1, p. 22, doi. 10.1093/itnow/bwx010
- By:
- Publication type:
- Article
Anonymous Limited-Use-Proof Entity Authentication Protocol.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1065, doi. 10.1007/s11277-017-4221-4
- By:
- Publication type:
- Article
Traceability Analysis of Recent RFID Authentication Protocols.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 1663, doi. 10.1007/s11277-015-2469-0
- By:
- Publication type:
- Article
Hardware Cost Measurement of Lightweight Security Protocols.
- Published in:
- Wireless Personal Communications, 2013, v. 71, n. 2, p. 1479, doi. 10.1007/s11277-012-0886-x
- By:
- Publication type:
- Article