Search results
Pomiary Automatyka Kontrola > 2013 > R. 59, nr 1 > 73--78
Concurrency and Computation: Practice and Experience > 33 > 10 > n/a - n/a
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 511 - 520
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 94 - 105
International Journal of Communication Systems > 31 > 1 > n/a - n/a
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 6 > 633 - 649
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 11 > 2518 - 2531
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 10 > 2402 - 2415
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 10 > 2334 - 2347
IEEE Transactions on Sustainable Computing > 2017 > 2 > 4 > 371 - 381
IEEE Transactions on Services Computing > 2017 > 10 > 5 > 701 - 714
IEEE Transactions on Services Computing > 2017 > 10 > 5 > 785 - 796
IEEE Transactions on Services Computing > 2017 > 10 > 5 > 715 - 725
Computers & Security > 2017 > 69 > C > 84-96
IEEE Transactions on Cloud Computing > 2017 > 5 > 3 > 390 - 404
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 5 > 1182 - 1194
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 4 > 940 - 952
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 3 > 676 - 688
IEEE Transactions on Parallel and Distributed Systems > 2017 > 28 > 3 > 717 - 730
IEEE Transactions on Services Computing > 2017 > 10 > 2 > 258 - 272