Search

Your search keyword '"Zeyad, Mohammad"' showing total 8 results

Search Constraints

Start Over You searched for: Author "Zeyad, Mohammad" Remove constraint Author: "Zeyad, Mohammad" Topic computer Remove constraint Topic: computer
8 results on '"Zeyad, Mohammad"'

Search Results

1. Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

2. On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols

3. Privacy Preservation Protocol for Smart Grid Networks

4. Security Weaknesses and Attacks on the Internet of Things Applications

5. A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

6. Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation

7. Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement and its Enhancement

8. Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols

Catalog

Books, media, physical & digital resources