-
1por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2004
Libro electrónico -
2por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2008
Libro electrónico -
3por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2005
Libro electrónico -
4por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2002
Libro electrónico -
5por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2006
Libro electrónico -
6por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2003
Libro electrónico -
7por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2001
Libro electrónico -
8por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2010
Libro electrónico -
9Publicado 2016“…ACM Conference on Computer and Communications Security…”
Libro electrónico -
10por Chen, Yan“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2011
Libro electrónico -
11por Denning, Dorothy“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1993
Libro electrónico -
12por Motiwalla, Juzar“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1999
Libro electrónico -
13por Gong, Li“…ACM Conference on Computer and Communications Security…”
Publicado 1998
Libro electrónico -
14por Ning, Peng“…ACM Conference on Computer and Communications Security…”
Publicado 2007
Libro electrónico -
15por Sadeghi, Ahmad-Reza“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2013
Libro electrónico -
16por Graveman, Richard“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1997
Libro electrónico -
17por Ahn, Gail-Joon“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2014
Libro electrónico -
18por ACM Workshop on Digital Rights Management“…11th ACM Conference on Computer and Communications Security 2004…”
Publicado 2004
Libro electrónico -
19por ACM Workshop on Security of Ad Hoc and Sensor Networks“…11th ACM Conference on Computer and Communications Security 2004…”
Publicado 2004
Libro electrónico -
20Publicado 2008“…15th ACM Conference on Computer and Communications Security 2008…”
Libro electrónico