Search results for: Brajendra Panda
Cluster Computing > 2017 > 20 > 3 > 2669-2685
Lecture Notes in Computer Science > Data and Applications Security XXIII > Intrusion Detection and Protocols > 111-125
Security and Communication Networks > 9 > 10 > 1132 - 1145
Lecture Notes in Computer Science > Distributed Computing and Internet Technology > Security > 267-277
IFIP — The International Federation for Information Processing > Research Directions in Data and Applications Security XVIII > Data Protection Techniques > 111-123
Lecture Notes in Computer Science > Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices > Anonymity/Database Security > 368-383
IFIP — The International Federation for Information Processing > Integrity and Internal Control in Information Systems VI > Refereed papers > 177-194
Lecture Notes in Computer Science > Distributed Computing and Internet Technology > Section 2 - Security and Privacy > 89-96
IFIP — The International Federation for Information Processing > Data and Applications Security XVII > Information Warfare > 16-30
IFIP — The International Federation for Information Processing > Integrity and Internal Control in Information Systems VI > Refereed papers > 177-194
IFIP — The International Federation for Information Processing > Data and Applications Security XVII > Information Warfare > 16-30
IFIP — The International Federation for Information Processing > Research Directions in Data and Applications Security XVIII > Data Protection Techniques > 111-123