Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             6 results found
no title author magazine year volume issue page(s) type
1 A method for identifying compromised clients based on DNS traffic analysis Stevanovic, Matija
2016
16 2 p. 115-132
article
2 ASICS: authenticated key exchange security incorporating certification systems Boyd, Colin
2016
16 2 p. 151-171
article
3 On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake Tiloca, Marco
2016
16 2 p. 173-193
article
4 PiSHi: click the images and I tell if you are a human Mehrnezhad, Maryam
2016
16 2 p. 133-149
article
5 Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection Singh, Ankit
2016
16 2 p. 195-211
article
6 Two-factor authentication for the Bitcoin protocol Mann, Christopher
2016
16 2 p. 213-226
article
                             6 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands