Works matching DE "CERTIFICATE authority"
1
- ISSA Journal, 2018, v. 16, n. 6, p. 20
- Article
2
- Discrete Mathematics, Algorithms & Applications, 2017, v. 9, n. 1, p. -1, doi. 10.1142/S1793830917500021
- Article
3
- Journal of Cryptology, 2006, v. 19, n. 4, p. 463, doi. 10.1007/s00145-006-0224-0
- Girault, Marc;
- Poupard, Guillaume;
- Stern, Jacques
- Article
4
- Bulletin of The Royal College of Surgeons of England, 2018, v. 100, n. 4, p. 163, doi. 10.1308/rcsbull.2018.E163
- Walsh, U;
- Rashid, S;
- Bokhari, S;
- Gould, S;
- Watfah, J;
- Qurashi, K;
- Sen, M;
- Liasis, L
- Article
5
- Computer Journal, 2015, v. 58, n. 10, p. 2748, doi. 10.1093/comjnl/bxv045
- WEI GAO;
- GUILIN WANG;
- XUELI WANG;
- KEFEI CHEN
- Article
6
- Telecommunication Systems, 2009, v. 41, n. 3, p. 229, doi. 10.1007/s11235-009-9144-2
- Muñoz, Jose;
- Esparza, Oscar;
- Forné, Jordi;
- Pallares, Esteve
- Article
7
- IETE Journal of Research, 2013, v. 59, n. 4, p. 376, doi. 10.4103/0377-2063.118032
- Hu Xiong;
- Zhiguang Qin;
- Fagen Li
- Article
8
- Defence Science Journal, 2016, v. 66, n. 6, p. 590, doi. 10.14429/dsj.66.9649
- Kumaraswamy, P.;
- Rao, C. V. Guru;
- Janaki, V.;
- Prashanth, K. V. T. K. N.
- Article
9
- IETE Technical Review, 2017, v. 34, n. 5, p. 561, doi. 10.1080/02564602.2016.1215270
- Article
10
- Mobile Networks & Applications, 2010, v. 15, n. 2, p. 191, doi. 10.1007/s11036-009-0164-7
- Rachedi, A.;
- Benslimane, A.;
- Otrok, H.;
- Mohammed, N.;
- Debbabi, M.
- Article
11
- Informatica Economica, 2009, v. 13, n. 1, p. 16
- Article
12
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2011, v. 36, n. 2, p. 245, doi. 10.1007/s13369-010-0018-4
- Hosseini Seno, Seyed Amin;
- Budiarto, Rahmat;
- Tat-Chee Wan
- Article
13
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 1, p. 49, doi. 10.1080/19393555.2016.1274805
- Kollati, Vijaya Kumar;
- K, Somasundaram
- Article
14
- New Review of Information Networking, 2004, v. 10, n. 2, p. 193, doi. 10.1080/13614570500091940
- Article
15
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8527010
- Khan, Salabat;
- Zhang, Zijian;
- Zhu, Liehuang;
- Li, Meng;
- Khan Safi, Qamas Gul;
- Chen, Xiaobing
- Article
16
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- Islam, SK Hafizul;
- Khan, Muhammad Khurram;
- Al-Khouri, Ali M.
- Article
17
- Sustainability (2071-1050), 2010, v. 2, n. 9, p. 2746, doi. 10.3390/su2092746
- Flynn, Hilary;
- Breger, Dwayne;
- Belden, Andrew;
- Bier, Asmeret;
- Laurent, Chad;
- Andrews, Natalie;
- Rickerson, Wilson
- Article
18
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 6131, doi. 10.1007/s11277-017-4830-y
- Janani, V.;
- Manikandan, M.
- Article
19
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 67, doi. 10.1007/s11277-016-3595-z
- Chae, Cheol-Joo;
- Cho, Han-Jin
- Article
20
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2308, doi. 10.1049/iet-com.2016.0331
- Article
21
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 488
- Kumar, CH. Rathan;
- Kumar, K. Sunil;
- Reddy, S. Sateesh
- Article
22
- PLoS ONE, 2013, v. 8, n. 6, p. 1, doi. 10.1371/journal.pone.0065460
- Ren, LiYong;
- Nie, XiaoWen;
- Dong, YuChi
- Article
23
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 325, doi. 10.1007/s11042-011-0789-y
- Daeinabi, Ameneh;
- Rahbar, Akbar
- Article
24
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 79
- Article
25
- Computer Science Journal of Moldova, 2011, v. 19, n. 1, p. 80
- Article
26
- IEEE Internet Computing, 2013, v. 17, n. 3, p. 18, doi. 10.1109/MIC.2013.27
- Roosa, Steven B.;
- Schultze, Stephen
- Article
27
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 3, p. 291
- Ayyasamy, Rajaram;
- Subramani, Palaniswami
- Article
28
- Journal of Information Science & Engineering, 2010, v. 26, n. 6, p. 2093
- ZHENG GONG;
- YU LONG;
- XUAN HONG;
- KEFEI CHEN
- Article
29
- Journal of Radioanalytical & Nuclear Chemistry, 2009, v. 279, n. 2, p. 659, doi. 10.1007/s10967-008-7357-6
- Bürger, S.;
- Mathew, K.;
- Mason, P.;
- Narayanan, U.
- Article
30
- Journal of Information Systems & Operations Management, 2013, v. 7, n. 1, p. 172
- Article
31
- Annals of the University of Oradea, Economic Science Series, 2009, v. 18, n. 4, p. 940
- Article
32
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 46, doi. 10.1007/s12083-012-0128-8
- Rahman, Md;
- Yan, Guanhua;
- Madhyastha, Harsha;
- Faloutsos, Michalis;
- Eidenbenz, Stephan;
- Fisk, Mike
- Article