Search Result Save to File Save as CSV
Your search for 38157 returns 6414 document(s)
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Kademlia-based node lookup system for anonymization networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 179-190
Author: Benedikt Westermann; Andriy Panchenko; Lexi Pimenidis; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An enhanced trust center based authentication in zigbee networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 471-484
Author: Kyunghwa Lee; Joohyun Lee; Bongduk Zhang, Jaeho Kim; Yongtas Shin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An efficient tree-based group key agreement using bilinear map, (LNCS-Lecture Notes in Computer Science 2576) Hal 357-371
Author: Sangwon Lee; Yongdae Kim; Kwangjo Kim; Dae-Hyun Ryu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next