Search Result Save to File Save as CSV
Your search for 38165 returns 3519 document(s)
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study on mosaic based CCTV system using localization, (LNCS-Lecture Notes in Computer Science 5576) Hal 814-822
Author: Jong-Min Kim; Myung-A Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs, (LNCS-Lecture Notes in Computer Science 5576) Hal. 450-460
Author: Nomica Imran; A.I. Khan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next