Sciweavers

4263 search results - page 70 / 853
» Network Security
Sort
View
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ALGOSENSORS
2009
Springer
15 years 9 months ago
Key Levels and Securing Key Predistribution against Node Captures
Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutyl...
SASN
2005
ACM
15 years 8 months ago
RFID security without extensive cryptography
Sindhu Karthikeyan, Mikhail Nesterenko