Search results for: Clemente Galdi
Journal of Ambient Intelligence and Humanized Computing > 2019 > 10 > 7 > 2883-2894
Multimedia Tools and Applications > 2017 > 76 > 24 > 26031- 26055
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks > Smart Devices > 16-35
Lecture Notes in Computer Science > Algorithms and Computation > Algorithmic Problems in Wireless Ad Hoc Networks > 533-542
Lecture Notes in Computer Science > STACS 2001 > Contributions > 271-282
Lecture Notes in Computer Science > Algorithms and Computation > 9B Computational Complexity and Cryptography > 645-654
Lecture Notes in Computer Science > Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics > Steganography Using Modern Arts > 140-151
Lecture Notes in Computer Science > Computer Security – ESORICS 2011 > Usability, Ttrust, and Economics of Security and Privacy > 472-488
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Privacy > 67-79
Lecture Notes in Computer Science > Infrastructure Security > Identification, Authentication, and Process > 30-39
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 9: Secure Electronic Voting and Web Applications Security > 396-410
Lecture Notes in Computer Science > Algorithms and Computation > Algorithmic Problems in Wireless Ad Hoc Networks > 809-818