Security in wireless sensor networks with mobile codes

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Threats, countermeasures, and advances in applied information security
Weitere Verfasser: Zboril, Frantisek (BerichterstatterIn), Horacek, Jan (BerichterstatterIn), Drahansky, Martin (BerichterstatterIn), Hanacek, Petr (BerichterstatterIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2012
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A distributed and secure architecture for signature and decryption delegation through remote smart cards 2012 Cattaneo, Giuseppe
Information security management : awareness of threats in e-commerce 2012 Rahman, Mohammad Mahfuzur
Analyzing information security goals 2012 Kolkowska, Ella
Towards a framework for collaborative enterprise security 2012 Misra, Janardan
Can formal methods really help : analyzing the security of electronic voting systems 2012 Weldemariam, Komminist
Countering spam robots : scrambled CAPTCHA and Hindi CAPTCHA 2012 Raj, Aditya
Security in wireless sensor networks with mobile codes 2012
Feature extraction methods for intrusion detection systems 2012 Hai Thanh Nguyen
Distributed key management scheme based on CL-PKC in P2P networks 2012 Li, Zhongwen
Security enhancement of peer-to-peer session initiation 2012 Zheng, Xianghan
Effective malware analysis using stealth breakpoints 2012 Vasudevan, Amit
Graphical passwords 2012 Catuogno, Luigi
A decision support system for privacy compliance 2012 Pearson, Siani
A privacy service for comparison of privacy and trust policies within SOA 2012 Allison, David S.
Creating and applying security goal indicator trees in an industrial environment 2012
Privacy-aware organisation-based access control model (PrivOrBAC) 2012 Ajam, Nabil
Embedded system security risk in a green-house environment 2012 Oraon, Trailokya
Grid of security : a decentralized enforcement of the network security 2012
A dynamic cyber security economic model : incorporating value functions for all involved parties 2012 Axelrod, C. Warren
A pragmatic approach to intrusion response metrics 2012 Strasburg, Chris
Alle Artikel auflisten