Your search for 38167 returns 5292 document(s) |
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190 |
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An authorization model for e-consent requirement in a health care application, (LNCS-Lecture Notes in Computer Science 2576) Hal 191-205 |
Author: Chun Ruan; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PLI: a new framework to protect digital content for P2P networks, (LNCS-Lecture Notes in Computer Science 2576) Hal 206-216 |
Author: Guofei Gu; Bin B. Zhu; Shipeng Li; Shiyong Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved algebraic traitor tracing scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 217-227 |
Author: Chunyan Bai; Guiliang Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240 |
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264 |
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292 |
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318 |
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330 |
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|