Your search for 37653 returns 4100 document(s) |
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643 |
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731 |
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740 |
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822 |
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs, (LNCS-Lecture Notes in Computer Science 5576) Hal. 450-460 |
Author: Nomica Imran; A.I. Khan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671 |
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hybrid dynamic programming, (LNCS-Lecture Notes in Computer Science 1201) Hal 391-396 |
Author: Wolf Kohn; Jeffrey B. Remmel; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|