Found: 7
Select item for more details and to access through your institution.
Retained-Key Encryption.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 1, doi. 10.4018/jitn.2013040101
- By:
- Publication type:
- Article
A Formal Framework for Patch Management.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 18, doi. 10.4018/jitn.2013040102
- By:
- Publication type:
- Article
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 32, doi. 10.4018/jitn.2013040103
- By:
- Publication type:
- Article
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 43, doi. 10.4018/jitn.2013040104
- By:
- Publication type:
- Article
Mission Assurance Challenges within the Military Environment.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 51, doi. 10.4018/jitn.2013040105
- By:
- Publication type:
- Article
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 66, doi. 10.4018/jitn.2013040106
- By:
- Publication type:
- Article
Knowing the Enemy at the Gates: Measuring Attacker Motivation.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2013, v. 5, n. 2, p. 83, doi. 10.4018/jitn.2013040107
- By:
- Publication type:
- Article