Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             6 results found
no title author magazine year volume issue page(s) type
1 Analysis of privacy in mobile telephony systems Arapinis, Myrto
2016
16 5 p. 491-523
article
2 A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study Sisaat, Khamphao
2016
16 5 p. 459-473
article
3 Certificateless and identity-based authenticated asymmetric group key agreement Zhang, Lei
2016
16 5 p. 559-576
article
4 Detecting zero-day attacks using context-aware anomaly detection at the application-layer Duessel, Patrick
2016
16 5 p. 475-490
article
5 Generic construction of an $$\mathrm {eCK}$$eCK-secure key exchange protocol in the standard model Alawatugoda, Janaka
2016
16 5 p. 541-557
article
6 Mutual authentications to parties with QR-code applications in mobile systems Huang, Cheng-Ta
2016
16 5 p. 525-540
article
                             6 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands