Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
An Efficient Anonymous Registration Scheme for Mobile IPv4
Computational Intelligence and Security
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |