Search results for: S. M. Yiu
Cluster Computing > 2019 > 22 > 1 > 1581-1593
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Ad Hoc Networks > 1st ICST International Conference on Ad Hoc Networks > 160-175
Lecture Notes in Computer Science > Information Security Practice and Experience > Invited Talks > 11-19
Lecture Notes in Computer Science > Multimedia Content Analysis and Mining > Regular Contributions > 203-212
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 443-457
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Internet Comunications Security (WICS) Workshop > 651-660
Lecture Notes in Computer Science > Advances in Web-Age Information Management > Data Integration & Filtering (Session 5A) > 355-366
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Digital Signature > 218-232
Lecture Notes in Computer Science > Knowledge Discovery and Data Mining. Current Issues and New Applications > Association Rules and Related Topics > 257-268
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Digital Signatures II > 352-369
Lecture Notes in Computer Science > Web Information Systems – WISE 2004 > Session 7: Web Caching and Content Analysis > 291-302
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Cryptographic Protocols > 99-115