Showing
1 - 4
results of
4
for search '
"Computer security"
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Reset Filters
Author:
Tate, Stephen R.
Reset Filters
Show filters (1)
Author:
Tate, Stephen R.
Search Results - "Computer security"
Showing
1 - 4
results of
4
for search '
"Computer security"
'
, query time: 1.34s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols.
by
Joglekar, Sachin P.
Published 2003
Subjects:
“
...
Computer
security
....
”
Get full text
Others
2
Mobile agent security through multi-agent cryptographic protocols.
by
Xu, Ke
Published 2004
Subjects:
“
...
Computer
security
....
”
Get full text
Others
3
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents
by
Gunupudi, Vandana
Published 2003
Subjects:
“
...
Computer
security
....
”
Get full text
Others
4
Flexible Digital Authentication Techniques
by
Ge, He
Published 2006
Subjects:
“
...
Computer
security
....
”
Get full text
Others
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Format
Others
4
Sources
NDLTD
4
Collections
NDLTD
4
Author
Tate, Stephen R.
Ge, He
1
Gunupudi, Vandana
1
Joglekar, Sachin P.
1
Xu, Ke
1
Language
English
4
Year of Publication
From:
To:
Loading...