Quantifying the operational status of the DNSSEC deployment
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Physiological signal monitoring in the waiting areas of an emergency room
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
A secure migration process for mobile agents
Software—Practice & Experience
Hi-index | 4.10 |
Understanding how the Secure Sockets Layer works requires reviewing the two cryptographic techniques on which it relies.