Search Result Save to File Save as CSV
Your search for 37620 returns 2905 document(s)
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Self-initialized distributed certificated authority for mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 392-401
Author: Meng Ge; Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149)
Author: Pramukh R. Karla Sang C.sUh Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next