4 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Buttyán, Levente.
Showing
1
-
4
of
4
for search:
'Buttyán, Levente.'
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
by
Buttyán
,
Levente
.
Published: Cambridge University Press, 2008
Description: xvii, 485 pages : illustrations ; 25 cm.
Located:
Loading...
Call Number:
Loading...
Book
Loading...
Save to List
Saved in:
2
Cryptographic obfuscation : a survey
by
Horváth, Máté,
Published: Springer, 2020
Description: 1 online resource (xxi, 107 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Decision and game theory for security : first international conference, GameSec 2010, Berlin, Germany, November 22-23, 2010 : proceedings
Published: Springer, 2010
Description: 1 online resource (xii, 265 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Security and privacy in ad-hoc and sensor networks : third European Workshop, ESAS 2006, Hamburg, Germany, Setpember 20-21, 2006 : revised selected papers
Published: Springer, 2006
Description: 1 online resource (x, 192 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer networks Security measures
Computer security
Wireless communication systems Security measures
Data encryption (Computer science)
Decision making
Game theory
Sensor networks
Sensor networks Security measures
×
Loading...