Wyniki wyszukiwania dla: Adrian Perrig
Computer Networks > 2016 > 105 > C > 180-193
2016 IEEE Symposium on Security and Privacy (SP) > 859 - 877
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Full Papers > 325-340
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 141-165
Lecture Notes in Computer Science > Distributed Computing in Sensor Systems > Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks > 372-385
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Authentication and Fraud Detection > 1-19
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 16-29
Lecture Notes in Computer Science > Computer Aided Verification > Tool Presentations: Rewriting and Theorem-Proving Techniques > 241-245