Personensuche
X
?
2015 10th Asia Joint Conference on Information Security ,
3
A Proposal for Detecting Distributed Cyber-Attacks Using Au..:
, In:
?
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication ,
7
A generic evaluation method for key management schemes in w..:
, In:
?
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication ,
10
Integrity for the In-flight web page based on a fragile wat..:
, In:
?
Advances in Information Security and Its Application; Communications in Computer and Information Science ,
15