-
1por Chen, Yan“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2011
Libro electrónico -
2por Denning, Dorothy“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1993
Libro electrónico -
3por Motiwalla, Juzar“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1999
Libro electrónico -
4por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2004
Libro electrónico -
5por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2008
Libro electrónico -
6por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2005
Libro electrónico -
7por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2002
Libro electrónico -
8por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2003
Libro electrónico -
9por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2001
Libro electrónico -
10por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2010
Libro electrónico -
11por Sadeghi, Ahmad-Reza“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2013
Libro electrónico -
12por Graveman, Richard“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 1997
Libro electrónico -
13por Ahn, Gail-Joon“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2014
Libro electrónico -
14por ACM Conference on Computer and Communications Security“…ACM Conference on Computer and Communications Security Corporate Author…”
Publicado 2006
Libro electrónico