Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis | 0 | 0.34 | 2019 |
Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication Protocol | 0 | 0.34 | 2017 |
An Automobile Security Protocol: Side-Channel Security Against Timing And Relay Attacks | 0 | 0.34 | 2017 |
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack. | 0 | 0.34 | 2014 |
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices. | 1 | 0.36 | 2014 |
A Secure TFTP Protocol with Security Proofs. | 2 | 0.38 | 2014 |
RF simulator for cryptographic protocol | 0 | 0.34 | 2014 |
A Queueing Analysis of Polling Based for Mobile Multihop Relay WiMAX Networks | 0 | 0.34 | 2013 |
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System | 3 | 0.41 | 2012 |
Identity-based Trusted Authentication in Wireless Sensor Network | 5 | 0.51 | 2012 |
Finest authorizing member of common criteria certification. | 2 | 0.70 | 2012 |
IBE-Trust: A security framework for Wireless Sensor Networks | 1 | 0.35 | 2011 |
Analysis of energy consumption on IBE-Trust security framework | 0 | 0.34 | 2011 |
Forming Virtualized Secure Framework For Location Based Services (Lbs) Using Direct Anonymous Attestation (Daa) Protocol | 1 | 0.36 | 2010 |
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). | 1 | 0.39 | 2010 |