Filter your results
- 3
- 3
- 3
- 3
- 2
- 1
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers
hal-01480181v1
|
||
|
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion ControlInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.488-500, ⟨10.1007/978-3-642-32498-7_37⟩
Conference papers
hal-01542435v1
|
||
|
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers
hal-01480204v1
|