Computer network security. 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8--10, 2010. Proceedings
DOI10.1007/978-3-642-14706-7zbMATH Open1193.68010OpenAlexW1627257729MaRDI QIDQ987863FDOQ987863
Authors:
Publication date: 16 August 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14706-7
Data encryption (aspects in computer science) (68P25) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Network design and communication in computer systems (68M10)
Cited In (3)
- Signature scheme using the root extraction problem on quaternions
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21--23, 2001. Proceedings
This page was built for publication: Computer network security. 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8--10, 2010. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q987863)