|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Chung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang |
Security of Mobile Agent-Based Web Applications. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Ali Khalili, Shahriar Mohammadi |
Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Jian Wu, Zhimin Huang |
Proxy-Based Web Service Security. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Bing H. Cheung |
Data analysis on mobile ad-hoc networks with commercial pre-wimax, EVDO and Wi-Fi products. |
PE-WASUN |
2008 |
DBLP DOI BibTeX RDF |
evdo, wimax, ad-hoc, wi-fi, vpn, high speed, wlan, data rates |
10 | Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen |
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Generic Construction of Certificate-Based Encryption. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li 0005 |
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Izumi Fuse, Shigeto Okabe, Takashi Yamanoue, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara, Tsuneo Yamada |
Improving computer ethics video clips for higher education. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
educational material, information security, computer ethics, video clips |
10 | Kai Hwang 0001 |
Massively Distributed Systems : From Grids and P2P to Clouds. |
GPC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio |
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, open toolkit, X.509 certificates |
10 | Miranda Mowbray, Antonio Lain |
Dominator-tree analysis for distributed authorization. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
access control, dominator tree, distributed authorization |
10 | Liang Yan, Chunming Rong |
RFID System Security Using Identity-Based Cryptography. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim |
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
An On-Line Secure E-Passport Protocol. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Liu Peng, Zong Rui, Liu Sizuo |
A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yiling Wen, Jianfeng Ma 0001 |
An Aggregate Signature Scheme with Constant Pairing Operations. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
10 | Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic |
10 | Chung-Ming Ou, Chung-Ren Ou |
SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor |
A Survey to Guide Group Key Protocol Development. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Guang Yao, Jun Bi |
A CGAbased IP source address authentication method in IPv6 access network. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta |
ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, xkms, long term validation |
10 | Apu Kapadia |
A Case (Study) For Usability in Secure Email Communication. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Sebastian Rieger, Bernhard Neumair |
Towards usable and reasonable Identity Management in heterogeneous IT infrastructures. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
10 | Luigi Liquori, Michel Cosnard |
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems. |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vipul Goyal |
Certificate Revocation Using Fine Grained Certificate Space Partitioning. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Yvo Desmedt, Tanja Lange 0001, Mike Burmester |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange |
10 | Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
An Effective and Secure Buyer-Seller Watermarking Protocol. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano |
Performance Evaluation of Security Services: An Experimental Approach. |
PDP |
2007 |
DBLP DOI BibTeX RDF |
Security, Web Services, Performance, Ubiquitous Computing, Mobile Devices |
10 | Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Gerla, Songwu Lu |
Secure incentives for commercial ad dissemination in vehicular networks. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
security, cooperation, incentives, vehicular ad hoc networks |
10 | Yi Mu 0001, Willy Susilo, Huafei Zhu |
Compact sequential aggregate signatures. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
RSA problem, communication, computer, provably secure, signatures |
10 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. |
ICDS |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
10 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
10 | Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafail Ostrovsky |
Round Complexity of Authenticated Broadcast with a Dishonest Majority. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Raphaël Chand, Luigi Liquori, Michel Cosnard |
Improving Resource Discovery in the Arigatoni Overlay Network. |
ARCS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
10 | Liyi Zhang, Qihua Liu, Min Xu |
Research and application of EJBCA based on J2EE. |
I3E (1) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Valentina Casola, Jesus Luna, Oscar Manso, Nicola Mazzocca, Manel Medina, Massimiliano Rak |
Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. |
GPC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tatsuaki Okamoto |
Authenticated Key Exchange and Key Encapsulation in the Standard Model. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Serena Pastore |
Distributed and local security policies for grid web-based resources. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jan Paul Kolter, Rolf Schillinger, Günther Pernul |
A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
10 | MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab |
A Framework for Secure Message Transmission Using SMS-Based VPN. |
CONFENIS (1) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, E-commerce, E-business, EAI, EDI |
10 | Calvin Chun Yu, Paul Jen-Hwa Hu |
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
A New Model for Public-Key Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Meng Yu 0001, Wanyu Zang, Barbara Reagor |
Decentralized Trust Management based on the Reputation of Information Sources. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Thomas Wölfl, Kai Fischbach |
A Method for the Certification and the Delegation of Trust in Distributed Systems. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mihir Bellare, Gregory Neven |
Multi-signatures in the plain public-Key model and a general forking lemma. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
forking lemma, cryptography, digital signatures, multi-signatures |
10 | Dae-Young Lee, Hyun-Cheol Jeong |
An Efficient Certificate Management for Mobile Ad-Hoc Network. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jan Camenisch, Dieter Sommer, Roger Zimmermann |
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao |
Bootstrapping multi-party ad-hoc security. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
bootstrapping security, pervasive computing |
10 | Won Jay Song, Moon Kyo Cho, Im Sook Há, Mun Kee Choi |
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Samia Boucherkha, Mohamed Benmohamed |
A Multi-tier Architecture to Safely Share Digital Medical Images. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn |
Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Inter-Domains Security, Trust Relationship, IP Multimedia System (IMS), Keys and Certificate Management |
10 | Zhenxing Luo, NuerMaimaiti Heilili, Dawei Xu, Chen Zhao 0001, Zuoquan Lin |
Web Application Security Gateway with Java Non-blocking IO. |
NGITS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Fabio Picconi, Nishkam Ravi, Marco Gruteser, Liviu Iftode |
Probabilistic validation of aggregated data in vehicular ad-hoc networks. |
Vehicular Ad Hoc Networks |
2006 |
DBLP DOI BibTeX RDF |
aggregation, vehicular networks, malicious nodes, data validation |
10 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Abderrezak Rachedi, Abderrahim Benslimane |
A Secure Architecture for Mobile Ad Hoc Networks. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
security, Wireless ad hoc networks, clustering algorithm |
10 | Despina Polemi, Spyridon Papastergiou |
A Secure e-Ordering Web Service. |
I3E |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Liang Li, Jie Tian 0001, Xin Yang 0001 |
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Christian Damsgaard Jensen, Paul O'Connell |
Trust-Based Route Selection in Dynamic Source Routing. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Didier Benza, Michel Cosnard, Luigi Liquori, Marc Vesin |
Arigatoni: A Simple Programmable Overlay Network. |
John Vincent Atanasoff Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Tiefang Wang, Tao Li 0016, Xun Gong 0006, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao 0007 |
Family Gene Based Grid Trust Model. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier |
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. |
ECOWS |
2006 |
DBLP DOI BibTeX RDF |
Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption |
10 | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Won Jay Song, Im Sook Há, Mun Kee Choi |
System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Huaji Shi, Xibin Zhao |
Implementation Issues of Authorization Mechanisms in Grid Computing Systems. |
SOSE |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
10 | Abderrezak Rachedi, Abderrahim Benslimane |
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | GeneBeck Hahn, Taekyoung Kwon 0002, Sinkyu Kim, JooSeok Song |
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | M. Francisca Hinarejos, Jordi Forné |
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Secure User Authentication Mechanism in Digital Home Network Environments. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi |
Shibboleth-based Access to and Usage of Grid Resources. |
GRID |
2006 |
DBLP DOI BibTeX RDF |
|
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. |
CEC/EEE |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Anantharaman Lakshminarayanan, Aditya Liviandi, Tong-Lee Lim, William Chui |
Can CRLs Provide Bandwidth-Efficient Online Certificate Status? |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Shanshan Song, Kai Hwang 0001, Yu-Kwong Kwok |
Trusted Grid Computing with Security Binding and Trust Integration. |
J. Grid Comput. |
2005 |
DBLP DOI BibTeX RDF |
NAS and PSA benchmarks, performance evaluation, fuzzy logic, resource allocation, computational Grids, trust models, scalability analysis |
10 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. |
Inf. Syst. Frontiers |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
10 | Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko |
Experiences of Applying Advanced Grid Authorisation Infrastructures. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hoon Wei Lim, Matthew J. B. Robshaw |
A Dynamic Key Infrastructure for Grid. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yevgeniy Dodis, Dae Hyun Yum |
Time Capsule Signature. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hoon Wei Lim, Kenneth G. Paterson |
Identity-Based Cryptography for Grid Security. |
e-Science |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Gianluigi Me, Maurizio Adriano Strangio |
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jin Park, Jeong-Tae Hwang, Young-Chul Kim 0001 |
FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | A. J. Stell, Richard O. Sinnott, John P. Watt |
Comparison of Advanced Authorisation Infrastructures for Grid Computing. |
HPCS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano |
High-Performance and Interoperable Security Services for Mobile Environments. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | H. W. Go, P. Y. Chan 0001, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li |
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
performance evaluation, mobile ad hoc network (MANET), flooding, public-key infrastructure, certificate revocation |
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam |
CredEx: User-Centric Credential Management for Grid and Web Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yun-Sam Kim, Eun-Sun Cho |
Preventing Illegal Usage of Mobile Phone Software. |
COMPSAC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Norihiro Sakamoto, Jun Nakaya |
Towards the Construction of the Information Infrastructure for Genome Medicine. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Mario Morelli, David Fernández, Antonio Fernandez Gómez-Skarmeta, Jordi Palet |
An IPv6 Internet Exchange Model: Lessons from Euro6IX Project. |
SAINT Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Seokhee Lee 0002, Hyunsang Kim, Sangjin Lee 0002, Jongin Lim 0001 |
Digital evidence collection process in integrity and memory information gathering. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #801 - #900 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|