Your search for 37619 returns 3720 document(s) |
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731 |
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740 |
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822 |
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs, (LNCS-Lecture Notes in Computer Science 5576) Hal. 450-460 |
Author: Nomica Imran; A.I. Khan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671 |
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803 |
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263 |
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Safety high accuracy context-aware matrix (CAM) making based on X.509 proxy certificate, (LNCS-Lecture Notes in Computer Science 5576)Hal 829-837 |
Author: Hoon Ko; Ning Chen; Goreti Marreiros; Carlos Ramos; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|