Search Result Save to File Save as CSV
Your search for 37619 returns 3698 document(s)
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A group key distribution scheme with decentralised user join, (LNCS-Lecture Notes in Computer Science 2576) Hal 146-163
Author: Hartono Kurnio; Rei Safavi-Naini; Huaxiong Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next