Browsing by Subject Security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 17 of 17
Issue DateTitleAuthor(s)
2008Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh NetworksKhan, S; Mast, N; Loo, KK; Silahuddin, A
2009Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networksNaeem, T; Loo, KK
2010Criminal justice in France after September 11: Has the balance between liberty and security been disturbed?Giannoulopoulos, D
30-Jan-2020Digital Identities for Internet of Things DevicesGronli, TM; Ginea, G
2009The Fascist Moment: Security, Exclusion, ExterminationNeocleous, M
2009A heuristic evaluation of the Facebook's advertising tool beaconJamal, A; Cole, M
15-Jan-2010Intelligence and the machinery of government: conceptualizing the intelligence communityDavies, PHJ
2016La lógica de la pacificación: Guerra-policía-acumulaciónNeocleous, MA
2014Mobile transactions over NFC and GSMSaeed, MQ; Walter, C; Pourghomi, P; Ghinea, G
2008Passive security threats and consequences in IEEE 802.11 wireless mesh networksKhan, S; Mast, N; Loo, KK; Silahuddin, A
2013A proposed NFC payment applicationPourghomi, P; Saeed, MQ; Ghinea, G
2020Recursive Secure Filtering over Gilbert-Elliott Channels in Sensor Networks: The Distributed CaseDing, D; Wang, Z; Han, QL; Zhang, XM
2017Security of VoIP traffic over low or limited bandwidth networksAlouneh, S; Abed, S; Ghinea, G
2008Security: Collective good or commodity?Krahmann, E
2014Trusted integration of cloud-based NFC transaction playersPourghomi, P; Saeed, MQ; Ghinea, G
2007Usability issues with security of electronic mailDeWitt, Alexander John Anthony George
2011Validating digital forensic evidenceShanmugam, Karthikeyan