Accès à distance ? S'identifier sur le proxy UCLouvain
Displaying 11 results.
-
- Journal article
(2010) Information Processing Letters — Vol. 110, no. 20, p. 882-886 (2010) -
- Journal article
(2011) IEEE Transactions on Information Forensics and Security — Vol. 99, p. 1-10 (2011) -
- Journal article
(2007) IEEE Design & Test of Computers — Vol. 24, no. 6, p. 544-545 (2007) -
- Journal article
(2012) Information Sciences — Vol. 199, p. 43-57 (2012) -
- Journal article
(2011) IEEE Communications Letters — , p. 1-3 (2011) -
- Speech
(2009) Cryptology and Network Security. 8th International Conference, CANS 2009 — Kanazawa, Japan -
- Speech
(2008) Fifth European PKI Workshop (EUROPKI 2008) — Trondheim (Norway) -
- Speech
(2010) Workshop on fault diagnosis and tolerance in cryptography (FDTC), 2010 — Santa Barbara, California, USA -
- Journal article
(2011) IEEE Transactions on Wireless Communications — Vol. 11, no. 5, p. 1818-1626 (2011) -
- Speech
(2008) ICISC 2008 : 11th International Conference — Seoul, Korea -
- Journal article
(2013) IEEE Transactions on Mobile Computing — Vol. 12, no.5, p. 830 - 839 (2013)