Spelling suggestions: "subject:"eomputer networks authentication."" "subject:"eomputer networks quthentication.""
1 |
The classification of e-authentication protocols for targeted applicabilityChia, Wan Yin. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Fulp, J. D. ; Huffmire, Ted. "December 2009." Description based on title screen as viewed on February 01, 2010. Author(s) subject terms: Authentication protocols, taxonomy, protocol classification, protocol applicability, operating environment. Includes bibliographical references (p. 69-72). Also available in print.
|
2 |
Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networksTaqieddin, Eyad Salah, January 2007 (has links) (PDF)
Thesis (Ph. D.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed October 25, 2007) Includes bibliographical references.
|
Page generated in 0.1121 seconds