Your search for 35706 returns 3834 document(s) |
An enhanced trust center based authentication in zigbee networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 471-484 |
Author: Kyunghwa Lee; Joohyun Lee; Bongduk Zhang, Jaeho Kim; Yongtas Shin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190 |
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adaptive image fusion scheme based on contourlet transform and machine learning, page 62-69 |
Author: M.H. Malik; S.A.M. Gilani; Anwaar-ul-Hag | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681 |
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A time-threshold-based preemption scheme for vertical handoff in cellular/WLAN interworking, 178-181 |
Author: Jialin Cai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Asynchronous Recovery Scheme based on Optimistic Message Logging for Mobile Computing System (436-443) |
Author: T. Park
H. Yeom; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446 |
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731 |
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Flexible internet secure transactions based on collaborative domains, (LNCS-Lecture Notes in Computer Science 1361) Hal 37-51 |
Author: Eduardo Solana; Jurgen Harms; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|