Search alternatives:
secure session » security session
design secure » designing secure, design security, design sears
session three » session types
2008 two » 2008 tcp, 2008 ts
1808 two » 18 two, 1.8 two, 13.8 two

1
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Cognitive Prosthetics -- Session 2: Context Awareness/Autonomous Computing -- An Integrated Approach...

2
by Stuttard, Dafydd
Published 2008
Wiley Pub.
Table of Contents: ... in Session Token Handling -- Securing Session Management -- Chapter Summary -- Questions -- Chapter 8...

3
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Two-Hops Neighbor-Aware Routing Protocol in Mobile Ad Hoc Networks -- H 2 O: Hierarchically...

4
by Zacker, Craig, Mackin, J. C.
Published 2017
Microsoft Press
Table of Contents: ...-to-cluster, and stretch cluster scenarios -- Skill 2.3 Implement data deduplication -- Implement...

5
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- The Importance of Including the Haptics Factor in Interaction Design -- Regular Papers -- Security Policy...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Privacy -- A Provable Secure Authentication Protocol Given Forward Secure Session Key -- A Secure Multi...

7
by Sessions, Roger
Published 2008
Microsoft Press
Table of Contents: ... -- Contraindications -- Phase 1: SIP Preparation -- Phase 2: Partitioning -- Phase 3: Partition Simplification -- Phase...