Serveur d'exploration sur la télématique - Curation (Istex)

Index « AbsEn.i » - entrée « security »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
securities < security < sed  Facettes :

List of bibliographic references

Number of relevant bibliographic references: 398.
[20-40] [0 - 20][0 - 50][40-60]
Ident.Authors (with country if any)Title
000A49 (2010) Neyire Deniz Sarier [Allemagne]Biometric Identity Based Signature Revisited
000A90 (2011) Leanid Krautsevich [Italie] ; Fabio Martinelli [Italie] ; Artsiom Yautsiukhin [Italie]A General Method for Assessment of Security in Complex Services
000A94 (2009) Moonbae Song [Corée du Sud] ; Hyunseung Choo [Corée du Sud, États-Unis]Towards Location-Based Real-Time Monitoring Systems in u-LBS
000B07 (2009) Antonio J. Jara [Espagne] ; Miguel A. Zamora [Espagne] ; Antonio F. G. Skarmeta [Espagne]An Architecture for Ambient Assisted Living and Health Environments
000B20 (2007) Geon Woo Kim [Corée du Sud] ; Deok Gyu Lee [Corée du Sud] ; Jong Wook Han [Corée du Sud] ; Sang Wook Kim [Corée du Sud]Security Technologies Based on Home Gateway for Making Smart Home Secure
000B68 (2004) Hideyuki Nakashima [Japon]Cyber Assist Project and Its Security Requirement
000B72 (2004) Saurabh Dutta [Népal, Inde] ; J. K. Mandal [Inde]Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions
000B88 (2010) Birgit Bomsdorf [Allemagne]RTM E : Extension of Role-Task Modeling for the Purpose of Access Control Specification
000C25 (2005) Tim Leinmüller ; Elmar Schoch ; Frank Kargl [Allemagne] ; Christian MaihöferInfluence of Falsified Position Data on Geographic Ad-Hoc Routing
000C26 (2004) Luca Vollero [Italie] ; Giulio Iannello [Italie]Analytical Modeling of a Traffic Differentiation Strategy for 802.11
000C27 (2004) S. Chessa [Italie] ; R. Di Pietro [Italie] ; P. Maestrini [Italie]Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2
000C44 (2005) Tran Khanh Dang [Royaume-Uni]Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers
000C45 (2005) David Ingram [Royaume-Uni]An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks
000C46 (2005) T. Dimitrakos [Royaume-Uni] ; G. Laria [Italie] ; I. Djordjevic [Royaume-Uni] ; N. Romano [Italie] ; F. D Ndria [Italie] ; V. Trpkovski [Royaume-Uni] ; P. Kearney [Royaume-Uni] ; M. Gaeta [Italie] ; P. Ritrovato [Italie] ; L. Schubert [Allemagne] ; B. Serhan [Allemagne] ; L. Titkov [Royaume-Uni] ; S. Wesner [Allemagne]Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications
000C47 (2005) Ciarán Bryce [Suisse] ; Nathan Dimmock [Royaume-Uni] ; Karl Krukow [Danemark] ; Jean-Marc Seigneur [Irlande (pays)] ; Vinny Cahill [Irlande (pays)] ; Waleed Wagealla [Royaume-Uni]Towards an Evaluation Methodology for Computational Trust Systems
000C52 (2009) Joppe W. Bos [Suisse] ; Onur Özen [Suisse] ; Jean-Pierre Hubaux [Suisse]Analysis and Optimization of Cryptographically Generated Addresses
000C53 (2009) Sebastian Gajek [Allemagne] ; Jörg Schwenk [Allemagne] ; Michael Steiner [États-Unis] ; Chen Xuan [Allemagne]Risks of the CardSpace Protocol
000C55 (2009) Yu-Yuan Chen [États-Unis] ; Ruby B. Lee [États-Unis]Hardware-Assisted Application-Level Access Control
000C58 (2007) Candy Yiu [États-Unis] ; Suresh Singh [États-Unis]Tracking People in Indoor Environments
000C68 (1993) John Snare [Australie]Information technology security standards — An Australian perspective
000C74 (2003) Roberto Gorrieri [Italie] ; Enrico Locatelli [Italie] ; Fabio Martinelli [Italie]A Simple Language for Real-Time Cryptographic Protocol Analysis

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Curation
HfdIndexSelect -h $EXPLOR_AREA/Data/Istex/Curation/AbsEn.i -k "security" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Istex/Curation/AbsEn.i  \
                -Sk "security" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Istex
   |étape=   Curation
   |type=    indexItem
   |index=    AbsEn.i
   |clé=    security
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024