Your search for 37620 returns 2905 document(s) |
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222 |
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357 |
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Self-initialized distributed certificated authority for mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 392-401 |
Author: Meng Ge; Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731 |
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228 |
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance evaluation of Cost effective routing for packet transmissions in mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 494-501 |
Author: Kentaro Kishida, Toshihiko Sasama; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511 |
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149) |
Author: Pramukh R. Karla
Sang C.sUh
Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305 |
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190 |
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|