Works matching DE "COMPUTER network protocol security measures"


Results: 37
    1
    2
    3

    Why Didn't We Spot That?

    Published in:
    IEEE Internet Computing, 2010, v. 14, n. 1, p. 84, doi. 10.1109/MIC.2010.21
    By:
    • Farrell, Stephen
    Publication type:
    Article
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21

    More Efficient Oblivious Transfer Extensions.

    Published in:
    Journal of Cryptology, 2017, v. 30, n. 3, p. 805, doi. 10.1007/s00145-016-9236-6
    By:
    • Asharov, Gilad;
    • Lindell, Yehuda;
    • Schneider, Thomas;
    • Zohner, Michael
    Publication type:
    Article
    22
    23
    24
    25

    Bayesian rational exchange.

    Published in:
    International Journal of Information Security, 2008, v. 7, n. 1, p. 85, doi. 10.1007/s10207-007-0039-5
    By:
    • Estevez-Tapiador, Juan;
    • Alcaide, Almudena;
    • Hernandez-Castro, Julio;
    • Ribagorda, Arturo
    Publication type:
    Article
    26
    27
    28
    29
    30
    31
    32
    33
    34

    Three-state quantum cryptography.

    Published in:
    Journal of Modern Optics, 2000, v. 47, n. 2/3, p. 507, doi. 10.1080/095003400148349
    By:
    • Phoenix, Simon J. D.;
    • Barnett, Stephen M.;
    • Chefles, Anthony
    Publication type:
    Article
    35
    36
    37

    FIXING THE loT PROBLEM.

    Published in:
    ITNOW, 2017, v. 59, n. 1, p. 22, doi. 10.1093/itnow/bwx010
    By:
    • Mitchell, John
    Publication type:
    Article