AAAAAA

   
Results: 1-5 |
Results: 5

Authors: MOLVA R TSUDIK G
Citation: R. Molva et G. Tsudik, SECRET SETS AND APPLICATIONS, Information processing letters, 65(1), 1998, pp. 47-55

Authors: SAMFAT D MOLVA R
Citation: D. Samfat et R. Molva, IDAMN - AN INTRUSION DETECTION ARCHITECTURE FOR MOBILE NETWORKS, IEEE journal on selected areas in communications, 15(7), 1997, pp. 1373-1380

Authors: BLUM C DUBOIS P MOLVA R SCHALLER O
Citation: C. Blum et al., A DEVELOPMENT AND RUNTIME PLATFORM FOR TELECONFERENCING APPLICATIONS, IEEE journal on selected areas in communications, 15(3), 1997, pp. 576-588

Authors: BIRD R GOPAL I HERZBERG A JANSON P KUTTEN S MOLVA R YUNG M
Citation: R. Bird et al., THE KRYPTOKNIGHT FAMILY OF LIGHTWEIGHT PROTOCOLS FOR AUTHENTICATION AND KEY DISTRIBUTION, IEEE/ACM transactions on networking, 3(1), 1995, pp. 31-41

Authors: BIRD R GOPAL I HERZBERG A JANSON PA KUTTEN S MOLVA R YUNG M
Citation: R. Bird et al., SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS, IEEE journal on selected areas in communications, 11(5), 1993, pp. 679-693
Risultati: 1-5 |