9th CCS 2002: Washington, DC, USA

Refine list

showing all ?? records

Cryptographic protocols

Key management and key exchange

Emerging applications

Cryptography

Network security

Authentication and authorization

Peer to peer networks

Analysis and verification

Intrusion detection

a service of  Schloss Dagstuhl - Leibniz Center for Informatics