Search

Your search keyword '"Karima Boudaoud"' showing total 19 results

Search Constraints

Start Over You searched for: Author "Karima Boudaoud" Remove constraint Author: "Karima Boudaoud" Topic computer Remove constraint Topic: computer
19 results on '"Karima Boudaoud"'

Search Results

1. Secure Email -- A Usability Study

2. Privacy aware group based recommender system in multimedia services

3. Reusing and Unifying Background Knowledge for Internet of Things with LOV4IoT

4. Generation of Transmission Control Rules Compliant with Existing Access Control Policies

5. Applying Internet of Things for Personalized Healthcare in Smart Homes

6. An alternative version of HTTPS to provide non-repudiation security property

7. Mobile cloud applications and traceability

8. Securing Mobile Mashups with SCCM

9. The STAC (security toolbox: attacks & countermeasures) ontology

10. Designing Security Properties-Centric Communication Protocols using a Component-Based Approach

11. A security-property-based approach for lowering power consumption of secure mobile Web access

12. Cloud computing, security and data concealment

13. A middleware for securing mobile mashups

14. A Component-Based Approach to Security Protocol Design

15. Designing Security Protocols Adapted to the Constraints of Mobile Environments

16. Towards an efficient implementation of traceback mechanisms in autonomous systems

17. Policy-driven Model for Security Management

18. Network security management with intelligent agents

19. A Multi-agents System for Network Security Management

Catalog

Books, media, physical & digital resources