Search

Your search keyword '"Gurtov, A."' showing total 40 results

Search Constraints

Start Over You searched for: Author "Gurtov, A." Remove constraint Author: "Gurtov, A." Topic authentication Remove constraint Topic: authentication
40 results on '"Gurtov, A."'

Search Results

1. SAVAH: Source Address Validation with Host Identity Protocol

2. Traversing Middleboxes with the Host Identity Protocol

3. IoT and HIP's Opportunistic Mode

4. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks

6. A Security Model for Controller-Pilot Data Communication Link

7. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

8. Analyzing Internet-connected industrial equipment

9. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

10. IoT and HIP's Opportunistic Mode.

11. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks

12. Anonymous Secure Framework in Connected Smart Home Environments

13. Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures

14. Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core

15. A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

16. Poster Abstract: An Efficient Authentication Model in Smart Grid Networks

17. Performance and security evaluation of intra-vehicular communication architecture

18. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks.

19. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

20. Secure lightweight protocols for medical device monitoring

21. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications

22. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography

23. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications.

24. Securing Medical Sensor Network with HIP

25. Secure Resolution of End-Host Identifiers for Mobile Clients

26. Comparison and Analysis of Secure Mobile Architecture (SMA) and Evolved Packet System

27. On application of Host Identity Protocol in wireless sensor networks

28. Distributed user authentication in wireless LANs

29. Performance of Host Identity Protocol on Symbian OS

30. Access Control Protocol With Node Privacy in Wireless Sensor Networks.

31. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

32. A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks.

33. Delegation-based robust authentication model for wireless roaming using portable communication devices.

34. A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks.

35. A layered encryption mechanism for networked critical infrastructures.

36. Analysis of the HIP base exchange protocol

37. Delegation-Based Robust Authentication Model for Wireless Roaming using Portable Communication Devices

38. Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems

39. Lightweight authentication and key management of wireless sensor networks for Internet of things

40. Enhanced communication security and mobility management in small-cell networks

Catalog

Books, media, physical & digital resources