Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis | 0 | 0.34 | 2019 |
An Automobile Security Protocol: Side-Channel Security Against Timing And Relay Attacks | 0 | 0.34 | 2017 |
A Formal Calculus for International Relations Computation and Evaluation. | 0 | 0.34 | 2016 |
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. | 0 | 0.34 | 2016 |
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack. | 0 | 0.34 | 2014 |
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices. | 1 | 0.36 | 2014 |
A Secure TFTP Protocol with Security Proofs. | 2 | 0.38 | 2014 |
RF simulator for cryptographic protocol | 0 | 0.34 | 2014 |
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System | 3 | 0.41 | 2012 |
Finest authorizing member of common criteria certification. | 2 | 0.70 | 2012 |