Current Search:  Computer security (x)

View All Items

  • CSV Spreadsheet
(81 - 85 of 85)

Pages

Energy Efficient Cluster-Based Target Tracking Strategy
Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem
Energy cost evaluation of a secure 802.11 wireless transmission using NS-2
Statistical broadcast protocol design for VANET
Modeling access control of medical information

Pages