Found: 12
Select item for more details and to access through your institution.
An Authorization Framework using Building Information Models.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1244, doi. 10.1093/comjnl/bxs098
- By:
- Publication type:
- Article
Capsule Reviews.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1147, doi. 10.1093/comjnl/bxs137
- By:
- Publication type:
- Article
Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.
- Published in:
- 2012
- By:
- Publication type:
- Correction Notice
A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1232, doi. 10.1093/comjnl/bxs096
- By:
- Publication type:
- Article
Casting Ballots over Internet Connection Against Bribery and Coercion.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1169, doi. 10.1093/comjnl/bxs003
- By:
- Publication type:
- Article
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1157
- By:
- Publication type:
- Article
Multi-Stride String Searching for High-Speed Content Inspection.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1216, doi. 10.1093/comjnl/bxs093
- By:
- Publication type:
- Article
Erratum: Computing and Computation.
- Published in:
- 2012
- By:
- Publication type:
- Correction Notice
Attribute-Based Oblivious Access Control.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1202, doi. 10.1093/comjnl/bxs061
- By:
- Publication type:
- Article
Interpreting Deep Structures of Information Systems Security.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1148, doi. 10.1093/comjnl/bxr118
- By:
- Publication type:
- Article
Cryptanalysis of Loiss Stream Cipher.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1192, doi. 10.1093/comjnl/bxs047
- By:
- Publication type:
- Article
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
- Published in:
- Computer Journal, 2012, v. 55, n. 10, p. 1180
- By:
- Publication type:
- Article