Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...


Computers & security, 2006-03, Vol.25 (2), p.137-153
2006
Link zum Volltext


IEEE transactions on automatic control, 2014-12, Vol.59 (12), p.3224-3237
2014

Journal of mathematical cryptology, 2010-10, Vol.4 (2), p.121-148
2010
Link zum Volltext

IEEE journal on selected areas in communications, 2006-02, Vol.24 (2), p.233-246
2006

Proceedings of the IEEE, 2006-12, Vol.94 (12), p.2142-2181
2006

Wireless networks, 2007-01, Vol.13 (1), p.127-148
2007
Link zum Volltext

Pervasive and mobile computing, 2013-08, Vol.9 (4), p.528-545
2013
Link zum Volltext

2010 IEEE Wireless Communication and Networking Conference, 2010, p.1-6
2010

IEEE/ACM transactions on networking, 2007-12, Vol.15 (6), p.1527-1540
2007

IEEE transactions on information theory, 2006-04, Vol.52 (4), p.1676-1682
2006

2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2001, Vol.3, p.1449-1452 vol.3
2001


49th IEEE Conference on Decision and Control (CDC), 2010, p.6765-6772
2010

2013 American Control Conference, 2013, p.4140-4147
2013

2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008, p.1221-1224
2008

2008 New Technologies, Mobility and Security, 2008, p.1-6
2008

2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006, p.1-9
2006

IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, 2004, Vol.2, p.1228-1232 Vol. 2
2004

IEEE transactions on mobile computing, 2013-02, Vol.12 (2), p.248-260
2013

IEEE transactions on mobile computing, 2009-09, Vol.8 (9), p.1221-1234
2009
Aktive Filter
PublikationsformBuchkapitel
ThemaCryptography
Suchergebnisse filtern
Filter anzeigen
Sprache
Erscheinungsjahr
n.n
n.n