abstemious 发表于 2025-3-23 13:13:20

http://reply.papertrans.cn/47/4656/465536/465536_11.png

rheumatology 发表于 2025-3-23 15:25:54

ID-Based Authentication for Mobile Conference Callnables a mobile unit and a base station to authenticate each other. It has an additional feature of providing mobile subscribers with location privacy. Reauthentication in the course of handoff is also discussed.

带子 发表于 2025-3-23 19:25:19

http://reply.papertrans.cn/47/4656/465536/465536_13.png

CERE 发表于 2025-3-24 01:09:07

ID-Based Authentication for Mobile Conference Callnables a mobile unit and a base station to authenticate each other. It has an additional feature of providing mobile subscribers with location privacy. Reauthentication in the course of handoff is also discussed.

ventilate 发表于 2025-3-24 04:21:48

New Security Paradigms: Orthodoxy and Heresyackers, viruses and Trojan horses. Because incremental improvements in security technology will never permit us to catch up, this paper explores radical new ways to meet the security needs of today and tomorrow.

cunning 发表于 2025-3-24 10:28:28

1868-4238 21st century. It will be essential readingfor informationtechnology security specialists, computerprofessionals, EDPmanagers, EDP auditors, managers, researchers andstudents working onthe subject.978-1-5041-2919-0Series ISSN 1868-4238 Series E-ISSN 1868-422X

施魔法 发表于 2025-3-24 13:34:18

http://reply.papertrans.cn/47/4656/465536/465536_17.png

interior 发表于 2025-3-24 18:02:02

https://doi.org/10.1007/978-1-5041-2919-0cryptography; information security; intrusion detection; privacy; systems security

我不怕牺牲 发表于 2025-3-24 22:28:03

http://reply.papertrans.cn/47/4656/465536/465536_19.png

SHOCK 发表于 2025-3-25 02:35:30

http://reply.papertrans.cn/47/4656/465536/465536_20.png
页: 1 [2] 3 4
查看完整版本: Titlebook: Information Systems Security; Facing the informati Sokratis K. Katsikas,Dimitris Gritzalis Book 1996 IFIP International Federation for Info