Found: 4
Select item for more details and to access through your institution.
An immersive view approach by secure interactive multimedia proof-of-concept implementation.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 19, p. 8401, doi. 10.1007/s11042-013-1682-7
- By:
- Publication type:
- Article
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 4, p. 291, doi. 10.1007/s10207-009-0083-4
- By:
- Publication type:
- Article
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.
- Published in:
- Journal of Network & Systems Management, 2007, v. 15, n. 1, p. 117, doi. 10.1007/s10922-006-9057-2
- By:
- Publication type:
- Article
Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 16, p. 5702, doi. 10.3390/app10165702
- By:
- Publication type:
- Article