Results 141 to 150 of about 401,573 (156)
Some of the next articles are maybe not open access.

Lightweight Certificateless Authenticated Key Agreement Protocol

Data security and privacy are important to prevent the reveal, modification and unauthorized usage of sensitive information. Theintroduction of using critical power devices for internet of things (IoTs),e-commerce, e-payment, and wireless sensor networks (WSNs) has broughta new challenge of security due to the low computation capability of sensors ...
openaire   +1 more source

Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis

IEEE Communications Surveys and Tutorials, 2019
Stephan Kleber, Lisa Maile, Frank Kargl
exaly  

Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey

IEEE Communications Surveys and Tutorials, 2017
Hyung-Sin Kim   +2 more
exaly  

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

IEEE Communications Surveys and Tutorials, 2015
Martin Strohmeier
exaly  

An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues

Nature Methods, 2017
Michael Corces   +2 more
exaly  

A Review of Multihoming Issues Using the Stream Control Transmission Protocol

IEEE Communications Surveys and Tutorials, 2012
Abdallah Shami
exaly  

Survey of security vulnerabilities in session initiation protocol

IEEE Communications Surveys and Tutorials, 2006
Tasos Dagiuklas   +2 more
exaly  

Key agreement protocol securer than DLOG

Words, Languages & Combinatorics III, 2003
Akihiro Yamamura, Kaoru Kurosawa
openaire   +1 more source

A New Authenticated Key Agreement Protocol

2007
Pierre E. ABI-CHAR   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy