Wyniki wyszukiwania dla: Josep Cotrina
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Techniques II > 398-409
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 624-633
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Techniques I > 61-73
Lecture Notes in Computer Science > Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living > AI Techniques > 796-799
Lecture Notes in Computer Science > Digital Watermarking > Session V: Special Session on Watermarking Security > 231-243
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 527-536
Lecture Notes in Computer Science > Information Security and Cryptology > Web and Media Security > 289-303
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Identification and Authentication II > 87-97
Computers & Security > 2010 > 29 > 5 > 628-635
IEEE Transactions on Information Theory > 2010 > 56 > 10 > 5335 - 5343
Wireless Networks > 2010 > 16 > 4 > 1123-1142
IEEE Latin America Transactions > 2007 > 5 > 6 > 471 - 478
Computers and Geosciences > 2004 > 30 > 6 > 671-682
Computer Aided Geometric Design > 2002 > 19 > 2 > 127-149