nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
|
Jeffrey Undercoffer |
|
2003 |
8 |
2 |
p. 113-125 13 p. |
artikel |
2 |
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
|
Undercoffer, Jeffrey |
|
2003 |
8 |
2 |
p. 113-125 |
artikel |
3 |
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware
|
John Zachary |
|
2003 |
8 |
2 |
p. 137-143 7 p. |
artikel |
4 |
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware
|
Zachary, John |
|
2003 |
8 |
2 |
p. 137-143 |
artikel |
5 |
Distributed PIN Verification Scheme for Improving Security of Mobile Devices
|
Jian Tang |
|
2003 |
8 |
2 |
p. 159-175 17 p. |
artikel |
6 |
Distributed PIN Verification Scheme for Improving Security of Mobile Devices
|
Tang, Jian |
|
2003 |
8 |
2 |
p. 159-175 |
artikel |
7 |
Guest Editorial: Security in Mobile Computing Environments
|
Jari Veijalainen |
|
2003 |
8 |
2 |
p. 111-112 2 p. |
artikel |
8 |
Guest Editorial: Security in Mobile Computing Environments
|
Veijalainen, Jari |
|
2003 |
8 |
2 |
p. 111-112 |
artikel |
9 |
Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration
|
Constantinos F. Grecas |
|
2003 |
8 |
2 |
p. 145-150 6 p. |
artikel |
10 |
Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration
|
Grecas, Constantinos F. |
|
2003 |
8 |
2 |
p. 145-150 |
artikel |
11 |
Optimizing the Energy Consumed by Secure Wireless Sessions Wireless Transport Layer Security Case Study
|
Ramesh Karri |
|
2003 |
8 |
2 |
p. 177-185 9 p. |
artikel |
12 |
Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study
|
Karri, Ramesh |
|
2003 |
8 |
2 |
p. 177-185 |
artikel |
13 |
Personal Trusted Devices for Web Services: Revisiting Multilevel Security
|
Edgar Weippl |
|
2003 |
8 |
2 |
p. 151-157 7 p. |
artikel |
14 |
Personal Trusted Devices for Web Services: Revisiting Multilevel Security
|
Weippl, Edgar |
|
2003 |
8 |
2 |
p. 151-157 |
artikel |
15 |
Supporting Fair Exchange in Mobile Environments
|
Holger Vogt |
|
2003 |
8 |
2 |
p. 127-136 10 p. |
artikel |
16 |
Supporting Fair Exchange in Mobile Environments
|
Vogt, Holger |
|
2003 |
8 |
2 |
p. 127-136 |
artikel |