Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors
Astorga, Jasone, Jacob, Eduardo, Toledo, Nerea, Aguado, Marina, Higuero, Marivi
Published in Wireless networks (01.05.2015)
Published in Wireless networks (01.05.2015)
Get full text
Journal Article
SYSTEMS AND METHODS FOR IMPLEMENTING COMPUTER TRANSMISSION SECURITY PROTOCOL
Year of Publication 24.04.2023
Get full text
Patent
Security protocol architecture for website authentications and content integrity
Abuhaija, Belal, Shilbayeh, Nidal, Alwakeel, Mohammad
Published in 2013 World Congress on Computer and Information Technology (WCCIT) (01.06.2013)
Published in 2013 World Congress on Computer and Information Technology (WCCIT) (01.06.2013)
Get full text
Conference Proceeding
Hifn Introduces HIPP II 8155 Security Protocol Processor
Published in PR Newswire
(24.02.2004)
Get full text
Newsletter
Mechanised Verification of Distributed State-Space Algorithms for Security Protocols
Gava, Frederic, Hidalgo, Arthur, Fortin, Jean
Published in Proceedings (International Symposium on Parallel and Distributed Computing) (01.12.2012)
Published in Proceedings (International Symposium on Parallel and Distributed Computing) (01.12.2012)
Get full text
Conference Proceeding
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Bodei, Chiara, Degano, Pierpaolo, Gao, Han, Brodo, Linda
Published in Electronic notes in theoretical computer science (08.11.2007)
Published in Electronic notes in theoretical computer science (08.11.2007)
Get full text
Journal Article