Skip to Main Content
Keywords: Network protocol
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
COMPEL (2013) 32 (2): 661–673.
Published: 01 March 2013
... present a new methodology to contain PRWORM via proper authentication of initiators of P2P communications. Second, three simple network protocols are proposed to fulfill automatic authentication. Findings Both simulations and strictly mathematical proof by Strand Space Model represent that the authors...

or Create an Account

Close Modal
Close Modal