Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 A note about the identifier parent property in Reed-Solomon codes Fernandez, Marcel
2010
29 5 p. 628-635
8 p.
article
2 A provably secure secret handshake with dynamic controlled matching Sorniotti, Alessandro
2010
29 5 p. 619-627
9 p.
article
3 Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony Soupionis, Yannis
2010
29 5 p. 603-618
16 p.
article
4 Collaborative privacy management Kolter, Jan
2010
29 5 p. 580-591
12 p.
article
5 Contents 2010
29 5 p. iv-
1 p.
article
6 Editorial Gritzalis, Dimitris
2010
29 5 p. 521-522
2 p.
article
7 IFC - Editorial Board 2010
29 5 p. IFC-
1 p.
article
8 IFIP TCII - Aims, Scope and Technical Committee 2010
29 5 p. 636-640
5 p.
article
9 Managing key hierarchies for access control enforcement: Heuristic approaches Blundo, Carlo
2010
29 5 p. 533-547
15 p.
article
10 On a taxonomy of delegation Pham, Quan
2010
29 5 p. 565-579
15 p.
article
11 Reconstruction of electronic signatures from eDocument printouts Leitold, Herbert
2010
29 5 p. 523-532
10 p.
article
12 Roving bugnet: Distributed surveillance threat and mitigation Farley, Ryan
2010
29 5 p. 592-602
11 p.
article
13 Taming role mining complexity in RBAC Colantonio, Alessandro
2010
29 5 p. 548-564
17 p.
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands