Author of the publication

Using Adaptative Encryption for Ubiquitous Environments.

, , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 540-548. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic Cryptoanalysis of Two Rounds TEA., , , and . International Conference on Computational Science (3), volume 2331 of Lecture Notes in Computer Science, page 1024-1031. Springer, (2002)Project WebOracle: Developing an advanced web server security assesment tool., , , , and . WebNet, page 526-529. AACE, (2001)Application of Network Smart Cards to Citizens Identification Systems., , , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 241-254. Springer, (2008)Survey of Attacks and Defenses on P2PSIP Communications., , , and . IEEE Commun. Surv. Tutorials, 14 (3): 750-783 (2012)A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol., , , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1309-1318. Springer, (2005)Marketing on Internet Communications Security for Online Bank Transactions., , , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1301-1308. Springer, (2005)Security Issues in Network File Systems., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 812-820. Springer, (2004)A systematic mapping study about socio-technical congruence., , , and . Inf. Softw. Technol., (2018)The strict avalanche criterion randomness test., , , , and . Math. Comput. Simul., 68 (1): 1-7 (2005)Low computational cost integrity for block ciphers., , , and . Future Gener. Comput. Syst., 20 (5): 857-863 (2004)