books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 25; Issue 2
Main
Computers & Security
Volume 25; Issue 2
Computers & Security
Volume 25; Issue 2
1
Layered security design for mobile ad hoc networks
Nikos Komninos
,
Dimitris Vergados
,
Christos Douligeris
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 298 KB
Your tags:
english, 2006
2
Provably secure authenticated key exchange protocols for low power computing clients
Hsiang-An Wen
,
Chun-Li Lin
,
Tzonelih Hwang
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 242 KB
Your tags:
english, 2006
3
Security considerations for incremental hash functions based on pair block chaining
Raphael C.-W. Phan
,
David Wagner
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 159 KB
Your tags:
english, 2006
4
About “Unofficial patches”
E. Eugene Schultz
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 78 KB
Your tags:
english, 2006
5
The metamorphosis of malware writers
Danny Bradbury
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 83 KB
Your tags:
english, 2006
6
Security Views - Malware Update
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 132 KB
Your tags:
english, 2006
7
Calendar of Events
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 42 KB
Your tags:
english, 2006
8
A new protocol to counter online dictionary attacks
Vipul Goyal
,
Virendra Kumar
,
Mayank Singh
,
Ajith Abraham
,
Sugata Sanyal
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 174 KB
Your tags:
english, 2006
9
A framework and taxonomy for comparison of electronic voting schemes
Krishna Sampigethaya
,
Radha Poovendran
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 569 KB
Your tags:
english, 2006
10
Uncovering identities: A study into VPN tunnel fingerprinting
Vafa D. Izadinia
,
D.G. Kourie
,
J.H.P. Eloff
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 255 KB
Your tags:
english, 2006
11
Computer forensics and electronic discovery: The new management challenge
Vicki Miller Luoma
Journal:
Computers & Security
Year:
2006
Language:
english
File:
PDF, 122 KB
Your tags:
english, 2006
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×