Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sécurité télécommunication")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 883

  • Page / 36
Export

Selection :

  • and

The improved risk analysis mechanism in the practical risk analysis systemHWANG, Sangcheol; LEE, Namhoon; SAKURAI, Kouichi et al.Lecture notes in computer science. 2005, pp 835-842, issn 0302-9743, isbn 3-540-24467-0, 8 p.Conference Paper

Steganography capacity: A steganalysis perspectiveCHANDRAMOULI, R; MEMON, N. D.SPIE proceedings series. 2003, pp 173-177, isbn 0-8194-4820-6, 5 p.Conference Paper

Dynamic group Diffie-Hellman key exchange under standard assumptionsBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 321-336, issn 0302-9743, isbn 3-540-43553-0Conference Paper

An architecture for secure policy enforcement in e-government services deploymentOIKONOMIDIS, Nikolaos; TCACIUC, Sergiu; RULAND, Christoph et al.Lecture notes in computer science. 2005, pp 284-285, issn 0302-9743, isbn 3-540-28791-4, 2 p.Conference Paper

Cryptanalysis of a pay-as-you-watch systemJOYE, Marc.Information processing letters. 2003, Vol 88, Num 3, pp 119-120, issn 0020-0190, 2 p.Article

ASIACRYPT 2002 : advances in cryptology (Queenstown, 1-5 December 2002 )Yuliang Zheng.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-00171-9, XIII, 578 p, isbn 3-540-00171-9Conference Proceedings

Les menaces sur le cyberespace: une réalitéDULUC, Philippe.REE. Revue de l'électricité et de l'électronique. 2012, Num 2, pp 16-20, issn 1265-6534, 5 p.Article

CMS 2005 : communications and multimedia security (Salzburg, 9-21 September 2005)Dittmann, Jana; Katzenbeisser, Stefan; Uhl, Andreas et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28791-4, XIII, 360 p, isbn 3-540-28791-4Conference Proceedings

EMERGING SECURITY ISSUES IN COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMSSEKARAN, K. Chandra.International journal of communication networks and distributed systems (Print). 2009, Vol 3, Num 4, issn 1754-3916, 155 p.Serial Issue

Web securityMCDANIEL, Patrick; RUBIN, Aviel D.Computer networks (1999). 2005, Vol 48, Num 5, issn 1389-1286, 133 p.Serial Issue

Active colluding attack to the dynamic participation in a secure conference scheme for mobile communicationFENG BAO.IEEE Vehicular Technology Conference. 2004, pp 3234-3235, isbn 0-7803-8521-7, 2 p.Conference Paper

A scheme of digital ticket for personal trusted deviceFENG BAO.IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. 2004, pp 3065-3069, isbn 0-7803-8523-3, 4Vol, 5 p.Conference Paper

The case for privacyCORBY, Michael J.Information systems security. 2002, Vol 11, Num 2, pp 9-14, issn 1065-898XArticle

Security and privacy (Berkeley CA, 12-15 May 2002)Proceedings - IEEE Symposium on Security and Privacy. 2002, issn 1081-6011, isbn 0-7695-1543-6, IX, 295 p, isbn 0-7695-1543-6Conference Proceedings

Security of information in IT systemsKALICZYNSKA, Malgorzata.SPIE proceedings series. 2005, pp 571-576, isbn 0-8194-5756-6, 6 p.Conference Paper

INFORMATION SECURITY PRACTICE AND EXPERIENCEBAO, Feng; WANG, Guilin.International journal of applied cryptography (Print). 2010, Vol 2, Num 1, issn 1753-0563, 83 p.Serial Issue

An efficient fail-stop signature scheme based on factorizationSUSILO, Willy; SAFAVI-NAINI, Rei.Lecture notes in computer science. 2003, pp 62-74, issn 0302-9743, isbn 3-540-00716-4, 13 p.Conference Paper

On fairness in exchange protocolsMARKOWITCH, Olivier; GOLLMANN, Dieter; KREMER, Steve et al.Lecture notes in computer science. 2003, pp 451-464, issn 0302-9743, isbn 3-540-00716-4, 14 p.Conference Paper

A Perfect Collision-Free Pseudonym SystemJI WON YOON; KIM, Hyoungshick.IEEE communications letters. 2011, Vol 15, Num 6, pp 686-688, issn 1089-7798, 3 p.Article

On the Security of a Novel and Efficient Unlinkable Secret Handshakes SchemeRENWANG SU.IEEE communications letters. 2009, Vol 13, Num 9, pp 712-713, issn 1089-7798, 2 p.Article

Internet Communications SecuritySIERRA, Jose Maria.Computer communications. 2006, Vol 29, Num 15, issn 0140-3664, 273 p.Serial Issue

An anti-spam scheme using pre-challengesROMAN, Rodrigo; JIANYING ZHOU; LOPEZ, Javier et al.Computer communications. 2006, Vol 29, Num 15, pp 2739-2749, issn 0140-3664, 11 p.Article

The user experienceMILLER, Jim.IEEE internet computing. 2005, Vol 9, Num 5, pp 90-92, issn 1089-7801, 3 p.Article

On scalability and modularisation in the modelling of network security systemsDE ALBUQUE, Joao Porto; KRUMM, Heiko; DE GEUS, Paulo Licio et al.Lecture notes in computer science. 2005, pp 287-304, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 18 p.Conference Paper

Access points vulnerabilities to DoS attacks in 802.11 networksFERRERI, F; BERNASCHI, M; VALCAMONICI, L et al.IEEE Wireless Communications and Networking Conference. 2004, pp 634-638, isbn 0-7803-8344-3, 5 p.Conference Paper

  • Page / 36