Your search for 38310 returns 4279 document(s) |
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199 |
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222 |
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved location acquisition algorithms for the location-based alert service, (LNCS-Lecture Notes in Computer Science 5576) Hal. 461-470 |
Author: So Young Kang, Jin-Wong, Kwang Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Shung-Bong Yang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An enhanced trust center based authentication in zigbee networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 471-484 |
Author: Kyunghwa Lee; Joohyun Lee; Bongduk Zhang, Jaeho Kim; Yongtas Shin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bayesian approach based comment spam defending tool, (LNCS-Lecture Notes in Computer Science 5576) Hal. 578-587 |
Author: Beatrice cynthia Dhinakaran; Dhinaharan Nagamalai; Jac-Kwang Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597 |
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607 |
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643 |
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681 |
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|