Showing 1 - 20 results of 39 for search 'López, Javier (Javier López-Muñoz)', query time: 0.33s
Refine Results
-
1
Location privacy in wireless sensor networks / by Rios, Ruben, 1983-, López, Javier (Javier López-Muñoz), Cuellar, Jorge
Published 2017Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
2
Location privacy in wireless sensor networks / by Rios, Ruben, 1983-, López, Javier (Javier López-Muñoz), Cuellar, Jorge
Published 2017Call Number: Loading…Full Text (via Taylor & Francis)
Located: Loading…
eBook -
3
Secure multi-party non-repudiation protocols and applications by Onieva, Jose A., López, Javier (Javier López-Muñoz), Zhou, Jianying
Published 2009Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
4
Critical information infrastructures security first international workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006 ; revised papers /
Published 2006Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
5
Critical information infrastructures security first international workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006 ; revised papers /
Published 2006Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…
Located: Loading…Electronic Conference Proceeding eBook Loading… -
6
Emerging challenges for security, privacy and trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
Published 2009Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
7
Wireless sensor network security /
Published 2008Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…
Located: Loading…Book Loading… -
8
Secure multi-party non-repudiation protocols and applications / by Onieva, Jose A.
Published 2009Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…
Located: Loading…Book Loading… -
9
Information security theory and practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26?27, 2016, Proceedings /
Published 2016Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
10
Information Security Practice and Experience : 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /
Published 2015Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
11
Computer Security ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008 : proceedings /
Published 2008Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
12
Critical information infrastructures security second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers /
Published 2008Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
13
Applied cryptography and network security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings /
Published 2011Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
14
Information security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings /
Published 2015Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
15
Information security practice and experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings /
Published 2019Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
16
Computer security--ESORICS 2007 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 : proceedings /
Published 2007Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
17
Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
Published 2010Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
18
Network and system security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings /
Published 2013Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
19
Information and communications security : 6th international conference, ICICS 2004, Malaga, Spain, October 27-29, 2004 : proceedings /
Published 2004Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
20
Computer security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings.
Published 2018Other Authors: “…López, Javier (Javier López-Muñoz)…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Security measures
Computer security
Computer networks
Electronic commerce
Business enterprises
Data encryption (Computer science)
Public key infrastructure (Computer security)
Computers
Access control
Data transmission systems
Computer organization
Computer science
Computers and civilization
Cooperating objects (Computer systems)
Data protection
Internet
Internet of things
Location-based services
Management
Telecommunication systems
Wireless sensor networks
Data structures (Computer science)
Information networks
Information technology
Sensor networks
Ubiquitous computing