Search results
Lecture Notes in Computer Science > Advances in Biometrics > Poster II > 594-603
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Authentication Authorization Accounting (AAA) Workshop > 577-583
Lecture Notes in Computer Science > Agent and Multi-Agent Systems: Technologies and Applications > Special Session: Intelligent and Secure Agent for Digital Content Management > 948-955
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > IDCS 2011 Papers > 175-185
Lecture Notes in Computer Science > Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices > Highly Constrained Embedded Systems > 122-137
Multimedia Systems and Applications > Advanced Wired and Wireless Networks > Ideas for Advanced Mobility Support > 105-128
Lecture Notes in Computer Science > Parallel Processing and Applied Mathematics > Workshop on Models, Algorithms and Methodologies for Grid-Enabled Computing Environments > 932-941
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – II > 102-115
Lecture Notes in Computer Science > Web Services > Web Services Security and Knowledge Management > 61-71
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 132-143
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Privacy Enhancing Technologies Symposium > 111-129
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2008 > Workshop on Mobile Communications (MC 2008) > 972-985
Lecture Notes in Computer Science > Information Security and Cryptology > Hashing and Authentication > 427-442