Sfoglia per Autore  

Opzioni
Mostrati risultati da 21 a 40 di 201
Titolo Anno di pubblicazione Autori Unitn File
Symmetric Key Authentication Services Revisited 1-gen-2004 Crispo, Bruno +
The Security Protocol International Workshop proceedings, 10 ed. 1-gen-2004 Crispo, Bruno +
Panel: security for grid-based computing systems issues and challenges 1-gen-2004 Crispo, Bruno +
One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks 1-gen-2005 Crispo, Bruno +
P-Hera: scalable fine-grained access control for P2P 1-gen-2005 Crispo, Bruno +
Describing Security Policies for Replicated Globe Objects 1-gen-2005 Crispo, Bruno +
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services 1-gen-2005 Crispo, Bruno +
RFID Guardian: A Battery-Powered Mobile Device for Personal RFID Privacy Management 1-gen-2005 Crispo, Bruno +
Securely Replicated Web Documents. 1-gen-2005 Crispo, Bruno +
Security Protocol International Workshop proceedings, 11 ed. 1-gen-2005 Crispo, Bruno +
A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks 1-gen-2005 Crispo, Bruno +
Malware: Truth vs. Myth 1-gen-2006 Crispo, Bruno +
RFID Malware: Design Principles and Examples 1-gen-2006 Crispo, Bruno +
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 1-gen-2006 Crispo, BrunoMassacci, Fabio +
The Evolution of RFID Security 1-gen-2006 Crispo, Bruno +
Lecturer Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 1-gen-2006 Crispo, Bruno +
Taking Sensor Networks from the Lab to the Jungle 1-gen-2006 Crispo, Bruno +
RFID Malware: Design Principles and Examples 1-gen-2007 Crispo, Bruno +
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers 1-gen-2007 Crispo, Bruno +
Security Protocols: 12th International Workshop: revised selected papers 1-gen-2007 Crispo, Bruno +
Mostrati risultati da 21 a 40 di 201
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile