Search

Your search keyword '"C.2.0"' showing total 529 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
529 results on '"C.2.0"'

Search Results

501. A new authentication protocol for revocable anonymity in ad-hoc networks

502. Alternative security architecture for IP Telephony based on digital watermarking

503. Secure Transmission of Sensitive data using multiple channels

504. Access Control Management in Distributed Object Systems

505. Finding Traitors in Secure Networks Using Byzantine Agreements

506. Using CAS to Manage Role-Based VO Sub-Groups

507. Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service

508. Systematic Performance Evaluation of Multipoint Protocols

509. On sigma-Filtered Boolean Algebras

510. Algorithms for Analysing Firewall and Router Access Lists

511. On-line file caching

512. Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance

513. The K-Server Dual and Loose Competitiveness for Paging

514. Avoiding Braess' Paradox through Collective Intelligence

515. Secure Execution of Java Applets using a Remote Playground

516. On Propagating Updates in a Byzantine Environment

517. ODP channel objects that provide services transparently for distributing processing systems

518. Transport Level Security: a proof using the Gong-Needham-Yahalom Logic

519. Adaptivity in Agent-Based Routing for Data Networks

520. Secure Multicast in a WAN

521. Proceedings from Critical Infrastructure: The Path Ahead (XIWT Symposium on Cross-Industry Activities for Information Infrastructure Robustness)

522. Anonymous Oblivious Transfer

523. Security Policy Specification Using a Graphical Approach

524. Security amplification by composition: The case of doubly-iterated, ideal ciphers

525. Adaptivity in Agent-Based Routing for Data Networks

526. Secure Execution of Java Applets using a Remote Playground

528. On-line file caching

529. Hang With Your Buddies to Resist Intersection Attacks

Catalog

Books, media, physical & digital resources