Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Security,
add a person with the name Security,
 

Other publications of authors with the same name

AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICATION AND MINIMIZED POWER CONSUMPTION, , , , , , , , , and 5 other author(s). International Journal on AdHoc Networking Systems (IJANS), 3 (2): 01-08 (April 2013)Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments, , and . (2010)Apache Module Report. (2011)Online; accessed 7-June-2012.Warning: it's attack season., and . Netw. Secur., 2021 (10): 6 (2021)2001 Computer Crime and Security Survey. (2001)A Novel approach for Implementing Security over Vehicular Ad hoc network using Signcryption through Network Grid. IJACSA - International Journal of Advanced Computer Science and Applications, 2 (4): 44--48 (2011)Report on U.s. Space Policy - Executive Summary. Report, U.S. Department of State, (April 2007)MSN Messenger PNG Image Parsing Vulnerability. http://www.coresecurity.com/, (2005)The functions of the district general hospital, , and . HMSO,, London, (1969)Hospital services: the future pattern of hospital provision in England. DHSS, London, (1980)