Author:
Ksiezopolski Bogdan,Szalachowski Pawel,Kotulski Zbigniew
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Merabti, M., Shi, Q., Oppliger, R.: Advanced security techniques for network protection. Computer Communications 23, 151–158 (2000)
2. Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computers & Security 26, 1873–1883 (2003)
3. CCIS;B. Ksiezopolski,2009
4. Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in the Wireless Sensor Networks. In: Elsevier: Information Processing Letters (accepted paper) (2010)
5. Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security 26, 246–255 (2007)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献