|
Journals in DBLP
MONET 2003, volume: 8, number: 2
- Jari Veijalainen, Ari Visa
Guest Editorial: Security in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:111-112 [Journal]
- Jeffrey Undercoffer, Filip Perich, Andrej Cedilnik, Lalana Kagal, Anupam Joshi
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:113-125 [Journal]
- Holger Vogt, Felix C. Gärtner, Henning Pagnia
Supporting Fair Exchange in Mobile Environments. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:127-136 [Journal]
- John Zachary, Richard Brooks
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:137-143 [Journal]
- Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris
Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:145-150 [Journal]
- Edgar Weippl, Wolfgang Eßmayr
Personal Trusted Devices for Web Services: Revisiting Multilevel Security. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:151-157 [Journal]
- Jian Tang, Vagan Y. Terziyan, Jari Veijalainen
Distributed PIN Verification Scheme for Improving Security of Mobile Devices. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:159-175 [Journal]
- Ramesh Karri, Piyush Mishra
Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security Case Study. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:177-185 [Journal]
|