نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

Journal: :Mathematics 2022

In the past few years, use of several medical devices is increasing. This paper will pay attention to a device developed get measures temperature diabetic foot. These wearables usually do not have cryptographic protocols guarantee data security. study analyzes existing security in these devices, and simulate malware propagation taking into account vulnerabilities lack highly-constrained interco...

2005
LIANG TIAN REINER DOJEN TOM COFFEY

Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. The design process of cryptographic protocols is highly complex. In particular, the translation from the informal protocol description to the formal protocol specification is an error-prone step, as the exact meaning of the requirements of the ...

Journal: :Electronic Notes in Theoretical Computer Science 2008

Journal: :ACM Transactions on Computational Logic 2001

Journal: :International Journal of Information Security 2005

2003
Ramesh Karri Piyush Mishra

Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید