Search results for: Julio Cesar Hernandez-Castro
Lecture Notes in Computer Science > Information Security Applications > Wireless and Sensor Network Security(1) > 56-68
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Tracks > 1292-1300
Lecture Notes in Computer Science > Computational Science and Its Applications — ICCSA 2003 > Internet Communications Security > 79-83
Lecture Notes in Computer Science > Information Security and Cryptology > Hashing and Authentication > 427-442
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 352-361
Lecture Notes in Computer Science > Parallel Problem Solving from Nature - PPSN IX > Representations, Operators, and Empirical Evaluation > 818-827
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis (II) > 462-469
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 781-794
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 912-923
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 1 > 22-34
Lecture Notes in Computer Science > Parallel Problem Solving from Nature - PPSN VIII > Learning Classifier Systems and Data Mining > 1061-1070
Lecture Notes in Computer Science > Parallel Problem Solving from Nature - PPSN IX > Representations, Operators, and Empirical Evaluation > 850-859
Lecture Notes in Computer Science > Genetic Programming > Posters > 325-336
Multimedia Tools and Applications > 2016 > 75 > 12 > 7087-7111
Journal of Computational and Applied Mathematics > 2014 > 259 > Part B > 571-577
Expert Systems > 31 > 1 > 9 - 19
The Journal of Supercomputing > 2013 > 65 > 2 > 949-960
Computers & Security > 2012 > 31 > 4 > 557-568
Journal of Network and Computer Applications > 2012 > 35 > 1 > 491-501