default search action
ICETE 2017: Madrid, Spain
- Mohammad S. Obaidat, Enrique Cabello:
E-Business and Telecommunications - 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper. Communications in Computer and Information Science 990, Springer 2019, ISBN 978-3-030-11038-3 - Paulo Salvador:
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph. 1-15 - Michele Luglio, Cesare Roseti, Enrico Russo, Francesco Zampognaro:
Ka-band High Throughput Satellites for 5G Based Applications: The Athena-Fidus Case Study. 16-37 - Alexandre Cormier, François Gagnon, Babak Esfandiari, Thomas Kunz:
Approaches to Securing P2PSIP in MANETs. 38-62 - Mathupayas Thongmak:
How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes. 63-80 - Zaharah Allah Bukhsh, Marten van Sinderen, Klaas Sikkel, Dick A. C. Quartel:
How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements. 81-103 - Andreas Ahrens, André Sandmann, Steffen Lochmann:
Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers. 104-122 - Marek Sýs, Dusan Klinec, Karel Kubicek, Petr Svenda:
BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. 123-149 - Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack. 150-172 - José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. 173-198 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray, Bruhadeshwar Bezawada:
History-Based Throttling of Distributed Denial-of-Service Attacks. 199-223 - Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel:
LocalPKI: An Interoperable and IoT Friendly PKI. 224-252 - Alexandre Anzala-Yamajako, Olivier Bernard, Matthieu Giraud, Pascal Lafourcade:
No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption. 253-277 - Félix Buendía García, Manuel Agustí-Melchor, Cristina Pérez-Guillot:
Computer-Based Analysis of Tomatis Listening Test System Audio Data. 278-291 - Evangelos D. Spyrou:
Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks. 292-312 - Markus Engel, Christopher Kramer, Tobias Braun, Dennis Christmann, Reinhard Gotzhein:
BiPS - A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application. 313-336 - David Nicolas Bartolini, César Benavente-Peces, Andreas Ahrens:
Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance. 337-345 - Peter Stavroulakis, Maryna Kolisnyk, Vyacheslav S. Kharchenko, Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis:
Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare. 346-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.