kw.\*:("Protocolo WAP")
Results 1 to 25 of 66
Selection :
WirelessHART Field DevicesMULLER, Ivan; CESAR NETTO, Joao; EDUARDO PEREIRA, Carlos et al.IEEE instrumentation & measurement magazine. 2011, Vol 14, Num 6, pp 20-25, issn 1094-6969, 6 p.Article
Evaluation of WAP network configuration supporting enhanced securitySHEORAN, Shailesh; LEUNG, Victor C. M.Interantional conference on consumer electronics. 2002, pp 78-79, isbn 0-7803-7300-6, 2 p.Conference Paper
New families of hyperelliptic curves with efficient gallant -lambert -vanstone methodTAKASHIMA, Katsuyuki.Lecture notes in computer science. 2005, pp 279-295, issn 0302-9743, isbn 3-540-26226-1, 17 p.Conference Paper
WAPS: Web application prototyping systemPAIANO, Roberto; PANDURINO, Andrea.Lecture notes in computer science. 2004, pp 256-260, issn 0302-9743, isbn 3-540-22511-0, 5 p.Conference Paper
Mobile commerce: Its market analysesLING BAI; CHOU, David C; YEN, David C et al.International journal of mobile communications (print). 2005, Vol 3, Num 1, pp 66-81, issn 1470-949X, 16 p.Article
A top-down algorithm for mining web access patterns from web logsGUO, Jian-Kui; RUAN, Bei-Jun; CHENG, Zun-Ping et al.Lecture notes in computer science. 2005, pp 838-843, issn 0302-9743, isbn 3-540-26076-5, 6 p.Conference Paper
Parallel implementation of WAP-tree mining algorithmMING WU; MOON JUNG CHUNG; MOONESINGHE, H. D. K et al.International conference on parallel and distributed simulation. 2004, pp 135-142, isbn 0-7695-2152-5, 1Vol, 8 p.Conference Paper
Wolf Attack Probability : A Theoretical Security Measure in Biometric Authentication Systems : Information and Communication System SecurityUNE, Masashi; OTSUKA, Akira; IMAI, Hideki et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1380-1389, issn 0916-8532, 10 p.Article
A two-player game system implemented under WAPWARREN, Andrew; EXCELL, Peter S; WYATT-MILLINGTON, William et al.International journal of mobile communications (print). 2005, Vol 3, Num 1, pp 38-48, issn 1470-949X, 11 p.Article
Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networksBARAKAT, Tamer M; ISMAIL, Ibrahim I; ALI, Ihab A et al.IEEE symposium on computers communications. 2004, isbn 0-7803-8623-X, 2Vol, vol1, 306-311Conference Paper
Searching for self-similarity in GPRSKALDEN, Roger; IBRAHIM, Sami.Lecture notes in computer science. 2004, pp 83-92, issn 0302-9743, isbn 3-540-21492-5, 10 p.Conference Paper
PC cluster based Parallel frequent pattern mining and Parallel web access pattern miningKITSUREGAWA, Masaru; PRAMUDIONO, Iko.Lecture notes in computer science. 2003, pp 172-176, issn 0302-9743, isbn 3-540-20111-4, 5 p.Conference Paper
WAPIOP: A WAP-based inter-ORB protocolROTHKUGEL, Steffen.IEE conference publication. 2003, pp 151-156, issn 0537-9989, isbn 0-85296-753-5, 6 p.Conference Paper
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf AttackINUMA, Manabu; OTSUKA, Akira; IMAI, Hideki et al.IEICE transactions on information and systems. 2013, Vol 96, Num 2, pp 357-364, issn 0916-8532, 8 p.Article
Exploring Image Registration Techniques for Layered SensingMENDOZA-SCHROCK, Olga; PATRICK, James A; GARING, Matthew et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7347, issn 0277-786X, isbn 978-0-8194-7613-5 0-8194-7613-7, 1Vol, 73470V.1-73470V.15Conference Paper
Security Analysis of Yeh-Tsai Security Mechanism : Information and Communication System SecurityDAE HYUN YUM; JONG HOON SHIN; PIL JOONG LEE et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1477-1480, issn 0916-8532, 4 p.Article
Time Based Patterns in Mobile-Internet SurfingHALVEY, Martin; KEANE, Mark T; SMYTH, Barry et al.CHI Conference. 2006, pp 31-34, isbn 1-59593-178-3, 4 p.Conference Paper
An efficient approach for mining periodic sequential access patternsBAOYAO ZHOU; SIU CHEUNG HUI; CHEUK MING FONG, Alvis et al.Lecture notes in computer science. 2004, pp 485-494, issn 0302-9743, isbn 3-540-22817-9, 10 p.Conference Paper
Quality of service and performance issues in multiservice networks subject to voice and video trafficsHOUETO, Fabien; PIERRE, Samuel.Computer communications. 2005, Vol 28, Num 4, pp 393-404, issn 0140-3664, 12 p.Article
A platform for secure e-gamblingBLUNDO, Carlo; CIMATO, Stelvio.International conference on information technology. 2004, isbn 0-7695-2108-8, 2Vol, vol2, 768-772Conference Paper
3G compliant wap based system for medical data accessCHUA SENG TEONG; JEOTI, Varun.Analog and digital techniques in electrical engineering. Conference. 2004, isbn 0-7803-8560-8, Vol2, 227-230Conference Paper
Attacks and solutions on aydos-savas-Koç's wireless authentication protocolMANGIPUDI, Kumar; MALNEEDI, Nagaraja; KATTI, Rajendra et al.IEEE Global Telecommunications Conference. 2004, pp 2229-2234, isbn 0-7803-8794-5, 6 p.Conference Paper
Multimodal browsing using voiceXMLCACCIA, Giuseppe; LANCINI, Rosa; PESCHIERA, Giuseppe et al.SPIE proceedings series. 2003, pp 1770-1778, isbn 0-8194-5023-5, 3Vol, 9 p.Conference Paper
SPREADing the WebCOUDERC, Paul; BANATRE, Michel.Lecture notes in computer science. 2003, pp 375-384, issn 0302-9743, isbn 3-540-20123-8, 10 p.Conference Paper
Adoption of the Internet and WAP-enabled phones in SingaporeTEO, Thompson S. H; SIAU HEONG POK.Behaviour & information technology (Print). 2003, Vol 22, Num 4, pp 281-289, issn 0144-929X, 9 p.Article