Search

Your search keyword '"Gurtov, A."' showing total 35 results

Search Constraints

Start Over You searched for: Author "Gurtov, A." Remove constraint Author: "Gurtov, A." Topic the internet Remove constraint Topic: the internet
35 results on '"Gurtov, A."'

Search Results

1. Simulating ADS-B Attacks in Air Traffic Management

2. Secure and Resilient Communications in the Industrial Internet

3. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security

4. Analyzing Internet-connected industrial equipment

5. Anonymous Secure Framework in Connected Smart Home Environments

6. Hierarchical architectures in structured peer-to-peer overlay networks

7. CIDOR: Content distribution and retrieval in disaster networks for public protection

8. Analysis of deployment challenges of Host Identity Protocol

9. CR-Chord: Improving lookup availability in the presence of malicious DHT nodes

10. Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split

11. Poster abstract

12. Hi3: An efficient and secure networking architecture for mobile hosts

13. Secure communication and data processing challenges in the industrial internet

14. On scalability properties of the Hi3 control plane

15. Case Studies in Secure Computing

16. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications

17. A scalable and secure VPLS architecture for provider provisioned networks

18. Mediating Multimedia Traffic with Strict Delivery Constraints

19. Hierarchical DHT Architectures

20. Host identity protocol (HIP): an overview

21. DISPUTE: Distributed puzzle tussle

22. Improving TCP-Friendliness for mHIP

23. Playing Defense by Offense: Equilibrium in the DoS-attack problem

24. A secure peer-to-peer web framework

25. Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)

26. Distributed user authentication in wireless LANs

27. Performance of Host Identity Protocol on Symbian OS

28. Usable security management with host identity protocol

29. Collaborative Reputation-based Voice Spam Filtering

30. Secure Multipath Transport For Legacy Internet Applications

31. SAVAH: Source Address Validation with Host Identity Protocol

32. Host Identity Protocol (HIP)

33. Performance of host identity protocol on lightweight hardware

34. Traversing Middleboxes with the Host Identity Protocol

35. Analysis of the HIP base exchange protocol

Catalog

Books, media, physical & digital resources