Search results for: Arturo Ribagorda
Lecture Notes in Computer Science > Information Security Applications > Wireless and Sensor Network Security(1) > 56-68
Lecture Notes in Computer Science > Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining > Data Mining in Marketing > 377-388
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 352-361
Lecture Notes in Computer Science > Parallel Problem Solving from Nature - PPSN IX > Representations, Operators, and Empirical Evaluation > 818-827
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoCOMNET Contributions > 93-98
Lecture Notes in Computer Science > Parallel Problem Solving from Nature – PPSN X > Applications > 981-990
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 781-794
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 912-923
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > Security, Risk and Privacy for the Semantic Web > 1755-1764
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops > Posters of the 2007 IS (Information Security) International Conference > 42-43
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Access Control > 141-152
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > NCUS 2006 Symposium > 183-192
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Internet Communication Security Workshop > 812-820
Lecture Notes in Computer Science > Emerging Trends in Information and Communication Security > Security in Service-Oriented Computing > 60-72
Lecture Notes in Computer Science > Parallel Problem Solving from Nature - PPSN IX > Representations, Operators, and Empirical Evaluation > 850-859
Lecture Notes in Computer Science > Emerging Trends in Information and Communication Security > Security and Protocols > 396-408