Search results for: Muhammad Khurram Khan
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > Session on Approaches or Methods of Security Engineering (AMSE 2011) > 458-470
Lecture Notes in Computer Science > Advances in Neural Networks - ISNN 2006 > Information Security > 214-223
Lecture Notes in Computer Science > Advances in Biometric Person Authentication > Other Biometrics > 629-638
Lecture Notes in Computer Science > Advances in Intelligent Computing > Other Applications > 723-732
Lecture Notes in Computer Science > Advances in Biometrics > Poster II > 702-712
Lecture Notes in Computer Science > Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence > Recent Advances of Intelligent Computing with Applications in the Multimedia Systems > 1141-1151
Lecture Notes in Computer Science > Advances in Computer Science and Information Technology > Information Security and Assurance > 55-60
Lecture Notes in Computer Science > Information Security Practice and Experience > Application I > 260-268
Lecture Notes in Computer Science > Emerging Intelligent Computing Technology and Applications > Applications of Intelligent Computing in Information Assurance and Security > 1014-1024
Communications in Computer and Information Science > Security Technology, Disaster Recovery and Business Continuity > 8-17
Communications in Computer and Information Science > Secure and Trust Computing, Data Management and Applications > STA2011 - Security Track > 122-129
Communications in Computer and Information Science > Secure and Trust Computing, Data Management and Applications > STA2011 - Security Track > 11-20
Communications in Computer and Information Science > Security Technology, Disaster Recovery and Business Continuity > 161-170
Communications in Computer and Information Science > Bio-Science and Bio-Technology > The Weighting Analysis of Influence Factor in Clinical Skin Physiology Assessment via Rough Set Method > 97-107
Communications in Computer and Information Science > Secure and Trust Computing, Data Management and Applications > STA2011 - Security Track > 1-10