Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
IEEE/ACM transactions on networking, 2017-04, Vol.25 (2), p.1206-1219
2017

IEEE transactions on information forensics and security, 2019-09, Vol.14 (9), p.2300-2314
2019

IEEE transactions on information forensics and security, 2023-01, Vol.18, p.1-1
2023

Journal of mathematical cryptology, 2010-10, Vol.4 (2), p.121-148
2010
Link zum Volltext

IEEE transactions on parallel and distributed systems, 2012-08, Vol.23 (8), p.1536-1550
2012


IEEE/ACM transactions on networking, 2011-02, Vol.19 (1), p.184-194
2011

Cryptology and Network Security, p.265-283
Link zum Volltext


IEEE/ACM transactions on networking, 2007-12, Vol.15 (6), p.1527-1540
2007


2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), 2010, p.1-10
2010


2016 IEEE Conference on Communications and Network Security (CNS), 2016, p.163-171
2016

2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012, p.1071-1078
2012

2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2015, p.435-442
2015

Proceedings of the 1st international conference on high confidence networked systems, 2012, p.31-40
2012
Link zum Volltext

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012, p.1814-1821
2012

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012, p.1395-1400
2012