A Multi-agent system architecture for monitoring medical protocols
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
Open Authentication Model Supporting Electronic Commerce in Distributed Computing
Electronic Commerce Research
QoS-Centric Stateful Resource Management in Information Systems
Information Systems Frontiers
An Open Secure Mobile Agent Framework for SystemsManagement
Journal of Network and Systems Management
Increasing Application Accessibility Through Java
IEEE Internet Computing
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
Behavior-based intrusion detection in mobile phone systems
Journal of Parallel and Distributed Computing - Problems in parallel and distributed computing: Solutions based on evolutionary paradigms
Prospects of Group-Based Communication in Mobile Ad hoc Networks
IWDC '02 Proceedings of the 4th International Workshop on Distributed Computing, Mobile and Wireless Computing
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
ISC '01 Proceedings of the 4th International Conference on Information Security
A Model for Mobile Code Using Interacting Automata
IEEE Transactions on Mobile Computing
Breakthrough in privacy concerns and lawful access conflicts
Telematics and Informatics
An electronic commerce framework for small and medium size enterprises
Data warehousing and web engineering
Security issues for wireless ATM networks
ACM SIGOPS Operating Systems Review
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Information Systems Frontiers
HYPPOCRATES: a new proactive password checker
Journal of Systems and Software
An Instruction-Level Distributed Processor for Symmetric-Key Cryptography
IEEE Transactions on Parallel and Distributed Systems
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Characteristics and responsibilities involved in a Phishing attack
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Neural Network Techniques for Proactive Password Checking
IEEE Transactions on Dependable and Secure Computing
A secure station for network monitoring and control
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA
Proceedings of the 20th annual conference on Integrated circuits and systems design
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Accelerated AES implementations via generalized instruction set extensions
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Entity Based Message Authentication System
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
P2P Networking and Applications
P2P Networking and Applications
Java-based and secure learning agents for information retrieval in distributed systems
Information Sciences: an International Journal
Fault-tolerant authentication services
International Journal of Computers and Applications
Optimal algorithms for detecting network stability
WALCOM'08 Proceedings of the 2nd international conference on Algorithms and computation
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Security mechanisms for the MAP agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
A distributed and privacy-preserving method for network intrusion detection
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Distributed group access control architecture for secure multicast
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Papílio cryptography algorithm
CIS'04 Proceedings of the First international conference on Computational and Information Science
Assurance method of high availability in information security infrastructure system
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Addressing malicious code in COTS: a protection framework
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
e-learning of security and information assurance with sequence diagrams
Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Automated monitoring of medical protocols: a secure and distributed architecture
Artificial Intelligence in Medicine
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Feature: Essential controls for internet electronic commerce
Network Security
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Hi-index | 0.00 |