-
1981
-
1982Published 2015Table of Contents: “… -- Analysing Virtual Machine Security in Cloud Systems -- Cloud Computing: Security Issues Overview and Solving…”
Full Text via HEAL-Link
Electronic eBook -
1983Published 2001Table of Contents: “… Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module…”
Full Text via HEAL-Link
Electronic eBook -
1984Published 2019Table of Contents: “… Matching -- New Opportunities for Compilers in Computer Security -- Footmark: A New Working Set Definition…”
Full Text via HEAL-Link
Electronic eBook -
1985Published 2005Table of Contents: “… Selection and Kernel Methods, Computer Security -- Computer Vision and Pattern Recognition: Computer Vision…”
Full Text via HEAL-Link
Electronic eBook -
1986Published 2004Table of Contents: “… Entry-Level Architecture for Computational Grids Based on Web Services -- Enhancing Java Grid Computing…”
Full Text via HEAL-Link
Electronic eBook -
1987Published 2016Table of Contents: “… Computing -- 6 Multimedia and Ubiquitous Computing Security -- 7 Multimedia and Ubiquitous Services -- 8…”
Full Text via HEAL-Link
Electronic eBook -
1988Published 2006Table of Contents: “…) -- Real Time Systems and Adaptive Applications (RTSAA 06) -- International Workshop on Grid Computing…”
Full Text via HEAL-Link
Electronic eBook -
1989
-
1990
-
1991Published 2007Table of Contents: “…-processor -- An Adaptive Encryption Protocol in Mobile Computing -- Security in Ad Hoc Network -- Pre…”
Full Text via HEAL-Link
Electronic eBook -
1992
-
1993Published 2004Table of Contents: “… -- Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion -- Computer Security…”
Full Text via HEAL-Link
Electronic eBook -
1994
-
1995
-
1996
-
1997
-
1998
-
1999
-
2000