Wyniki wyszukiwania
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Advanced Security Services (ASS 7) > 987-995
Lecture Notes in Computer Science > Communications and Multimedia Security > VoIP Security > 154-165
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Message Authentication > 225-239
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 2: Peer to Peer Computing > 468-470
Communications in Computer and Information Science > Computer Networks and Intelligent Computing > Section VII: Wireless Networks > 416-421
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless and Sensor Network Security I > 119-133
Lecture Notes in Computer Science > Information Security > Privacy > 159-165
Lecture Notes in Computer Science > Transactions on Computational Science VI > Part 1: Information Systems and Communications > 95-114
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 457-472
Communications in Computer and Information Science > Global Security, Safety, and Sustainability > 174-182
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Ad Hoc Networks > 1st ICST International Conference on Ad Hoc Networks > 160-175
Lecture Notes in Computer Science > Cryptology and Network Security > Security in Ad Hoc Networks and Wireless Sensor Networks > 378-394
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2004 > Approaches or Methods of Security Engineering > 572-577
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Ad Hoc Networks > Network Security and Reliability > 344-358
Lecture Notes in Computer Science > Computer Aided Systems Theory – EUROCAST 2007 > Systems Theory and Simulation: Formal Approaches > 73-81