Your search returned 13 results.

Sort
Results
formal Analysis of Improved and Secure Architecture of E-Voting System Using Hierarchical Coloured Petri Nets by
  • Ahmad, Z
  • Ahmad, F
  • Gondal, Z.A
Source: The Nucleus; a Quarterly Scientific Journal
Material type: Article Article; Format: print
Availability: Not available: Engr Abul Kalam Library: Available on Request (1).
Secure and Efficient Report Protocol for Networked Smart Grid Systems Using linear Map by
  • Kim, Youngsam
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Analysis and Enhancement of an Optomized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol by
  • Wei, Fushan
  • Zhang, Zhenfeng
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Relations Among Notions of Privacy for Rfid Authentication Protocols by
  • Moriyama, Daisuke
  • Matsuo, Shin'Ichiro
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Key De-Synchronization Attack Against Yuksel-Nielson'S Key Distribution Protocol for Zigbee Wireless Sensor Networks by
  • Park, Chang-Seop
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Verifying Authentication Protocols in Csp by
  • Schneider, Steve
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
A Process for Supporting Risk-Aware Web Authentication Mechanism Choice by
  • Renaud, Karen
Source: Reliability Engineering and System Safety
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Java-Based Internet Biometric Authentication System by
  • Everitt, Ross A.J
Source: Ieee Transactions on Pattern Analysis and Machine Intelligence
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
The Mithra Authentication Protocol by
  • Fremberg, Daniel
Source: Dr. Dobbs Journal:Software tools for Professional Programmer.
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Hop Integrity in Computer Networks by
  • Gouda, M. G
Source: Ieee/Acm Transactions on Networking
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Biometric Security by
  • Dale, Richard
Source: Dr. Dobbs Journal:Software tools for Professional Programmer.
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Applications of Combinatorial Designs in Computer Science by
  • Colbourn, Charles J
  • Van Oorschot, Paul C
Source: Acm Computing Surveys
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Security Mechanisms in High-Level Network Protocols by
  • Voydock, Victor L
  • Kent, Stephen T
Source: Acm Computing Surveys
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Pages