Search alternatives:
secure session » security session
design secure » designing secure, design security, design sears
session three » session types
two world » two worlds
2008 two » 1808 two, 2008 tcp, 2008 ts

1
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Cognitive Prosthetics -- Session 2: Context Awareness/Autonomous Computing -- An Integrated Approach...

2
by Stuttard, Dafydd
Published 2008
Wiley Pub.
Table of Contents: ... in Session Token Handling -- Securing Session Management -- Chapter Summary -- Questions -- Chapter 8...

3
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- The Importance of Including the Haptics Factor in Interaction Design -- Regular Papers -- Security Policy...

4
by Sessions, Roger
Published 2008
Microsoft Press
Table of Contents: ... -- Contraindications -- Phase 1: SIP Preparation -- Phase 2: Partitioning -- Phase 3: Partition Simplification -- Phase...

5
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Privacy -- A Provable Secure Authentication Protocol Given Forward Secure Session Key -- A Secure Multi...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Two-Hops Neighbor-Aware Routing Protocol in Mobile Ad Hoc Networks -- H 2 O: Hierarchically...

7
by Zacker, Craig, Mackin, J. C.
Published 2017
Microsoft Press
Table of Contents: ...-to-cluster, and stretch cluster scenarios -- Skill 2.3 Implement data deduplication -- Implement...