Matthias Hollick Secure Service Centered Networking for Nomadic Usage. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Rapee Puertpan Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
J. Qian ACLA: A framework for Access Control List (ACL) Analysis and Optimization. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Karl Scheibelhofer What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Roland Schmitz Security for the core network of third generation mobile systems. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
N. Shin Virtual Hidden Network. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Peter Meerwald Quantization Watermarking in the JPEG2000 Coding Pipeline. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Mehrdad Jalali An integrated secure Web architecture for protected mobile code distribution. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
G. Karlinger Deployment of Electronic Signatures in the XML world according to the international standard XML Signature Syntax and Processing. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
Ahmet M. Eskicioglu A Key Transport Protocol Based on Secret Sharing - An Application to Message Authentication. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
C. Fremidt Transferability in Coin Systems with Observers. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]