Academic literature on the topic 'Security protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security protocol"
Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (2022): 9103. http://dx.doi.org/10.3390/s22239103.
Full textSharma, Garima, and Harish Mittal. "SS7 Signaling Protocol ? Security." International Journal of Scientific Engineering and Research 4, no. 5 (2016): 31–34. https://doi.org/10.70729/ijser15811.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Full textAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Full textHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Full textKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (2021): 2057. http://dx.doi.org/10.3390/s21062057.
Full textWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Full textDu, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (2022): 24. http://dx.doi.org/10.3390/fi15010024.
Full textDissertations / Theses on the topic "Security protocol"
O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textChoi, H. J. "Security protocol design by composition." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textAraya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textJones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textHanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.
Find full textBooks on the topic "Security protocol"
Jones, Benjamin Edward. Improving security in the FDDI protocol. Naval Postgraduate School, 1992.
Find full textUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. United Service Institution of India, 2014.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.
Find full text1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations, 2008.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.
Find full textHehir, Stephen. A security target for the X.435 protocol. National Physical Laboratory, 1995.
Find full textKaksonen, Rauli. A functional method for assessing protocol implementation security. Technical Research Centre of Finland, 2001.
Find full textHeld, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Wiley & Sons, 2000.
Find full textArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Full textCanada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). s.n, 1989.
Find full textBook chapters on the topic "Security protocol"
Sahu, Satej Kumar. "Protocol Security." In Building Secure PHP Applications. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0932-3_6.
Full textSaïdi, Hassen, Victoria Stavridou, and Bruno Duterte. "Protocol Codesign." In Security Protocols. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.
Full textStavridou, Victoria. "Protocol Codesign." In Security Protocols. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.
Full textKelsey, John, Bruce Schneier, and David Wagner. "Protocol interactions and the chosen protocol attack." In Security Protocols. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.
Full textSchoenmakers, Berry. "Protocol." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.
Full textHess, Andreas V., Sebastian A. Mödersheim, and Achim D. Brucker. "Stateful Protocol Composition." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.
Full textPaulson, Lawrence C. "The Yahalom Protocol." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.
Full textKøien, Geir M. "Security Protocol Verification." In Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.
Full textWeik, Martin H. "protocol security option." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.
Full textMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Access Protocol." In Security Access in Wireless Local Area Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.
Full textConference papers on the topic "Security protocol"
Cai, Liujia, Tong Yu, Yumeng Li, et al. "SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00067.
Full textQatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.
Full textTan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textPinto, Lucas W. P., and Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol." In IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.
Full textTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Full textWang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, and Qixu Liu. "Medical Protocol Security." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.
Full textFerreira, Thiago D., Otavio Felipe de Freitas, Renan C. A. Alves, Bruno C. Albertini, Marcos A. Simplicio Jr., and Daniel M. Batista. "SPDM-WiD: Uma Ferramenta para Inspeção de Pacotes do Security Protocol Data Model (SPDM)." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbrc_estendido.2024.3175.
Full textGervais, Mwitende. "Lightweight Certificateless Authenticated Key Agreement Protocol." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131928.
Full textBassil, Carole, Ahmed Serhrouchni, and Nicolas Rouhana. "Simple voice security protocol." In Proceeding of the 2006 international conference. ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.
Full textMcDermott, J. "Visual security protocol modeling." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.
Full textReports on the topic "Security protocol"
Symington, S., S. Farrell, H. Weiss, and P. Lovell. Bundle Security Protocol Specification. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6257.
Full textMcDermott, J. Visual Security Protocol Modeling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada464079.
Full textKuhn, D. R., K. Sriram, and D. C. Montgomery. Border gateway protocol security. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.
Full textBirrane, E., and K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9172.
Full textBirrane, E., A. White, and S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9173.
Full textFarrell, S., M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5327.
Full textAtkinson, Randall J. Security for the Internet Protocol. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada301902.
Full textAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1825.
Full textKent, S., and R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2401.
Full textHollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3749.
Full text