Frontiers in Security and Dependability
暂无分享,去创建一个
[1] Joonsang Baek,et al. Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[2] eva Kühn,et al. Securing a Space-Based Service Architecture with Coordination-Driven Access Control , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] Shuichiro Yamamoto,et al. A Framework for Dependability Consensus Building and In-Operation Assurance , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[4] Bruno Blanchet,et al. From Computationally-Proved Protocol Specifications to Implementations and Application to SSH , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[5] Simon Tjoa,et al. Evidence and Cloud Computing: The Virtual Machine Introspection Approach , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[6] Niklas Lavesson,et al. Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..