135 results on '"RIOS, RUBEN"'
Search Results
2. A survey on the (in)security of trusted execution environments
3. Recipient Anonymity
4. Distributed Detection of APTs: Consensus vs. Clustering
5. Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
6. Modelling privacy-aware trust negotiations
7. Biodiversity, Host Specificity, and Dominance by Eusocial Species among Sponge-Dwelling Alpheid Shrimp on the Belize Barrier Reef
8. Query Privacy in Sensing-as-a-Service Platforms
9. An empirical evaluation of BLE for ITS scenarios
10. Evolving privacy: From sensors to the Internet of Things
11. Distributed Detection of APTs: Consensus vs. Clustering
12. EL PROCESO DE INVESTIGACIÓN EN INSTITUCIONES DE EDUCACIÓN EN MÉXICO
13. Multiple Origins of Eusociality among Sponge-Dwelling Shrimps (Synalpheus)
14. Privacy-Aware Trust Negotiation
15. Catalogue of the Cuba marine shallow waters carideans (Crustacea, Decapoda, Caridea)
16. New reports of crustacean decapods (Crustacea: Decapoda) from Cuban marine shelf
17. Camarones carideos del Golfo de California VI. Alpheidae del estuario de Mulegé y de Bahía Concepción, Baja California Sur, México (Crustacea: Caridea)
18. Cybersecurity profiles based on human-centric IoT devices
19. Probabilistic receiver-location privacy protection in wireless sensor networks
20. Location Privacy in WSNs: Solutions, Challenges, and Future Trends
21. Preserving Receiver-Location Privacy in Wireless Sensor Networks
22. HIDE_DHCP: Covert Communications through Network Configuration Messages
23. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
24. Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
25. Covert communications through network configuration messages
26. A privacy-aware continuous authentication scheme for proximity-based access control
27. Query Privacy in Sensing-as-a-Service Platforms
28. EL MUNDO SERÁ BABILONIA
29. Constrained Proximity Attacks on Mobile Targets
30. Privacy-Aware Trust Negotiation
31. Personal IoT Privacy Control at the Edge
32. SPOTTING WEAKNESSES IN SPANISH ENGINEERING DEGREES VIA COMPETENCE VISUALIZATION
33. Caridean Shrimps of the Gulf of California. III. Leptalpheus mexicanus, New Species (Crustacea, Decapoda, Alpheidae)
34. Sterna antillarum browni en el Golfo de California: Observaciones Sobre una Colonia Reproductora en una Zona Vulnerable al Impacto Turistico
35. Preserving Receiver-Location Privacy in Wireless Sensor Networks
36. Location Privacy in WSNs: Solutions, Challenges, and Future Trends
37. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
38. REDUCING INEQUALITIES IN MASTER DEGREE STUDENTS DUE TO SKEWED CURRICULA
39. Tax treaty treatment of income and gains from oil and gas exploitation.
40. Constrained Proximity Attacks on Mobile Targets.
41. Phylogenetic evidence for an ancient rapid radiation of Caribbean sponge-dwelling snapping shrimps ( Synalpheus)
42. Edge-Assisted Vehicular Networks Security
43. Immune System for the Internet of Things Using Edge Technologies
44. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations
45. PRoFIT: Modelo forense-IoT con integración de requisitos de privacidad
46. PRoFIT: Modelo forense-IoT con integración de requisitos de privacidad
47. A Methodology for Privacy-Aware IoT-Forensics
48. Digital Witness and Privacy in IoT: Anonymous Witnessing Approach
49. Terahertz-Wave Characterization of LTG-GaAs Thin-Film Photoconductive Antenna
50. From SMOG to Fog: A security perspective
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.