Filter your results
- 3
- 3
- 3
- 3
- 1
- 1
- 1
- 1
- 3
- 2
- 1
- 2
- 2
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.299-314, ⟨10.1007/978-3-642-30436-1_25⟩
Conference papers
hal-01518237v1
|
||
|
Reputation-Aware Learning for SLA NegotiationNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.80-88, ⟨10.1007/978-3-642-30039-4_10⟩
Conference papers
hal-01533582v1
|
||
|
Path Computation in Multi-layer Multi-domain Networks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.421-433, ⟨10.1007/978-3-642-30045-5_32⟩
Conference papers
hal-01531112v1
|