Visual Programming of Location-Based Services
暂无分享,去创建一个
Franco Milicchio | Enrico Marino | Federico Spini | Alberto Paoluzzi | Antonio Bottaro | Maurizio Rosina | A. Paoluzzi | F. Milicchio | E. Marino | Federico Spini | M. Rosina | Antonio Bottaro
[1] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[2] Francisco Curbera,et al. Bite: Workflow Composition for the Web , 2007, ICSOC.
[3] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[4] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[5] Fu Lee Wang,et al. Web Information Systems and Mining , 2010, Lecture Notes in Computer Science.
[6] Christophe De Cannière,et al. Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.
[7] William Stallings,et al. Network Security Essentials , 1999 .
[8] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[9] Zhongfu Wu,et al. EPN-Based Web Service Composition Approach , 2009, WISM.
[10] Vincent Rijmen,et al. Analysis of simplified variants of SHA-256 , 2005, WEWoRC.
[11] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.
[12] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[13] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[14] Priya Narasimhan,et al. Service-Oriented Computing - ICSOC 2007, Fifth International Conference, Vienna, Austria, September 17-20, 2007, Proceedings , 2007, ICSOC.
[15] Koustuv Dasgupta,et al. A service creation environment based on end to end composition of Web services , 2005, WWW '05.
[16] Franco Milicchio,et al. A Visual Approach To Geometric Programming , 2005 .
[17] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.