Works matching DE "COMPUTER network protocol security measures"
1
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 1, doi. 10.1007/s12083-015-0400-9
- Chaudhry, Shehzad;
- Naqvi, Husnain;
- Sher, Muhammad;
- Farash, Mohammad;
- Hassan, Mahmood
- Article
2
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 2, p. 216, doi. 10.1007/s12083-014-0251-9
- Yang, Tingting;
- Lai, Chengzhe;
- Lu, Rongxing;
- Jiang, Rong
- Article
3
- IEEE Internet Computing, 2010, v. 14, n. 1, p. 84, doi. 10.1109/MIC.2010.21
- Article
4
- Expert Systems, 2014, v. 31, n. 1, p. 9, doi. 10.1111/j.1468-0394.2012.00652.x
- Barrero, David F.;
- Hernández ‐ Castro, Julio César;
- Peris ‐ Lopez, Pedro;
- Camacho, David;
- R ‐ Moreno, María D.
- Article
5
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 198
- Manjaly, Joel Joy;
- Sandeep, J.
- Article
6
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 837
- Khodke, Swati A.;
- Deshpande, Jayant S.
- Article
7
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 576
- Reddy, E. Madhusudhana;
- Reddy, M. Srujan Kumar
- Article
8
- AI Communications, 2011, v. 24, n. 3, p. 281, doi. 10.3233/aic-2010-0489
- Article
9
- ICTACT Journal on Communication Technology, 2017, v. 8, n. 2, p. 1533, doi. 10.21917/ijct.2017.0226
- Shinde, Amol H.;
- Umbarkar, A. J.;
- Pillai, N. R.
- Article
10
- Telecommunication Systems, 2013, v. 54, n. 3, p. 215, doi. 10.1007/s11235-013-9729-7
- Zhang, Yubao;
- Wang, Hui;
- Li, Pei;
- Jiang, Zhihong
- Article
11
- 2011
- Yang, Hao;
- Osterweil, Eric;
- Massey, Dan;
- Lu, Songwu;
- Zhang, Lixia
- Case Study
12
- International Journal of Emerging Technologies in Learning, 2011, v. 6, p. 21, doi. 10.3991/ijet.v6iS1.1615
- Leão, C. P.;
- Soares, F. O.;
- Machado, J. M.;
- Seabra, E.;
- Rodrigues, H.
- Article
13
- Software Testing: Verification & Reliability, 2015, v. 25, n. 5-7, p. 684, doi. 10.1002/stvr.1531
- Dadeau, Frédéric;
- Héam, Pierre‐Cyrille;
- Kheddam, Rafik;
- Maatoug, Ghazi;
- Rusinowitch, Michael
- Article
14
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1065, doi. 10.1007/s11277-017-4221-4
- Zhou, Jian;
- Sun, Liyan;
- Song, Meina;
- Song, Junde
- Article
15
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 1663, doi. 10.1007/s11277-015-2469-0
- Alavi, Seyed;
- Baghery, Karim;
- Abdolmaleki, Behzad;
- Aref, Mohammad
- Article
16
- Wireless Personal Communications, 2013, v. 71, n. 2, p. 1479, doi. 10.1007/s11277-012-0886-x
- Jäppinen, Pekka;
- Lampi, Mikko
- Article
17
- Journal of Computer Science & Control Systems, 2009, v. 2, n. 2, p. 16
- Jurcut, Anca;
- Coffey, Tom;
- Dojen, Reiner;
- Gyorodi, Robert
- Article
18
- Quantum Information Processing, 2015, v. 14, n. 10, p. 3827, doi. 10.1007/s11128-015-1083-0
- Article
19
- Cryptologia, 2014, v. 38, n. 4, p. 370, doi. 10.1080/01611194.2014.915261
- Wang, Qinglong;
- Ding, Jintai
- Article
20
- Cryptologia, 2010, v. 34, n. 4, p. 282, doi. 10.1080/01611194.2010.509284
- Article
21
- Journal of Cryptology, 2017, v. 30, n. 3, p. 805, doi. 10.1007/s00145-016-9236-6
- Asharov, Gilad;
- Lindell, Yehuda;
- Schneider, Thomas;
- Zohner, Michael
- Article
22
- Journal of Cryptology, 2017, v. 30, n. 3, p. 601, doi. 10.1007/s00145-016-9231-y
- Prabhakaran, Manoj;
- Rosulek, Mike
- Article
23
- International Journal of Information Security, 2011, v. 10, n. 5, p. 301, doi. 10.1007/s10207-011-0133-6
- Marconi, Luciana;
- Conti, Mauro;
- Di Pietro, Roberto
- Article
24
- International Journal of Information Security, 2008, v. 7, n. 6, p. 395, doi. 10.1007/s10207-008-0057-y
- Balopoulos, Theodoros;
- Gritzalis, Stefanos;
- Katsikas, Sokratis
- Article
25
- International Journal of Information Security, 2008, v. 7, n. 1, p. 85, doi. 10.1007/s10207-007-0039-5
- Estevez-Tapiador, Juan;
- Alcaide, Almudena;
- Hernandez-Castro, Julio;
- Ribagorda, Arturo
- Article
26
- International Journal of Information Security, 2007, v. 6, n. 4, p. 213, doi. 10.1007/s10207-006-0011-9
- Chen, L.;
- Cheng, Z.;
- Smart, N.
- Article
27
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1816462
- El Ksimi, Ali;
- Leghris, Cherkaoui
- Article
28
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3167, doi. 10.1002/sec.1241
- Sun, Haiyan;
- Wen, Qiaoyan;
- Zhang, Hua;
- Jin, Zhengping
- Article
29
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3262, doi. 10.1002/sec.1250
- Li, Nan;
- Mu, Yi;
- Susilo, Willy;
- Guo, Fuchun;
- Varadharajan, Vijay
- Article
30
- Security & Communication Networks, 2015, v. 8, n. 4, p. 574, doi. 10.1002/sec.1004
- Chang, Chin-Chen;
- Sun, Chin-Yu;
- Cheng, Ting-Fang
- Article
31
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1253, doi. 10.1002/sec.857
- Ruan, Ou;
- Chen, Jing;
- Zhou, Jing;
- Cui, Yongquan;
- Zhang, Mingwu
- Article
32
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 12, p. 4604, doi. 10.3837/tiis.2014.12.021
- Kirsal-Ever, Yoney;
- Eneh, Agozie;
- Gemikonakli, Orhan;
- Mostarda, Leonardo
- Article
33
- ISRN Communications & Networking, 2012, p. 1, doi. 10.5402/2012/528374
- El-Maliki, Tewfiq;
- Seigneur, Jean-Marc
- Article
34
- Journal of Modern Optics, 2000, v. 47, n. 2/3, p. 507, doi. 10.1080/095003400148349
- Phoenix, Simon J. D.;
- Barnett, Stephen M.;
- Chefles, Anthony
- Article
35
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1313, doi. 10.3837/tiis.2013.05.021
- Xiaowei Li;
- Yuqing Zhang;
- Xuefeng Liu;
- Jin Cao
- Article
36
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1291, doi. 10.3837/tiis.2013.05.020
- Chenlei Cao;
- Ru Zhang;
- Mengyi Zhang;
- Yixian Yang
- Article
37
- ITNOW, 2017, v. 59, n. 1, p. 22, doi. 10.1093/itnow/bwx010
- Article