Amanote Research

Amanote Research

    RegisterSign In

Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios

Frontiers in ICT - Switzerland
doi 10.3389/fict.2015.00011
Full Text
Open PDF
Abstract

Available in full text

Categories
Information SystemsComputer NetworksHardwareCommunicationsArchitectureArtificial IntelligenceSoftware
Date

August 3, 2015

Authors
Maria-Camilla FiazzaMichele PeroliLuca Viganò
Publisher

Frontiers Media SA


Related search

Wireless Networks Interference and Security Protection by Means of Vegetation Barriers

Progress In Electromagnetics Research M
OpticalElectronicCondensed Matter PhysicsMagnetic Materials
2011English

Developing Security Protocols by Refinement

2010English

Integrating Service Discovery Protocols With Presence-Based Communications for Ad Hoc Collaborative Scenarios

2004English

Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification

IEEE Transactions on Information Forensics and Security
RiskComputer NetworksCommunicationsReliabilitySafetyQuality
2011English

Change Propagation in Collaborative Processes Scenarios

2012English

Attack Resistant Collaborative Filtering

2008English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Verification of Security Protocols

English

Vulnerable Manhood: Collaborative Testimonios of Latino Male Faculty

Berkeley Review of Education
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy