Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
CHINACOM 2008
ChinaCom2008-NIS 2008ChinaCom2008-OCN 2008ChinaCom2008-FCN 2008ChinaCom2008-WCN 2008ChinaCom2008-MCS 2008ChinaCom2008-Industrial 2008MUSIC 2008ChinaCom2008-AIS 2008ChinaCom2008-DBMC 2008COGCOM 2008ChinaCom2008-SPC 2008COMNETS 2008ChinaCom2008-ICT 2008
Other Years
Ethics and Malpractice Statement

    ChinaCom2008-NIS

    ChinaCom2008-Network and Information Security Symposium

    NIS: Networking and Information Security Symposium

    NIS: Networking and Information Security Symposium

    more »
    Editor(s): Jian Chu (Zhejiang University, China) and Andreas Molisch (MERL, USA and Lund University, Sweden)
    Publisher
    IEEE
    ISBN
    978-1-4244-2373-6
    Conference dates
    25th–28th Aug 2008
    Location
    Hangzhou, China
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2023 IEEE

    Ordered by title or year
    Showing 11–16 of 16 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • Generating Network Attack Graphs for Security Alert Correlation

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan
    • Random Key Management Using Group Deployment in Large-scale Sensor Networks

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Ting Yuan, Jianqing Ma, Shiyong Zhang
    • Scalable RFID Authentication and Discovery in EPCglobal Network

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Tieyan Li, Robert Deng
    • Security and Design Issues of Regroup-And-Go MIX

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Jinqiao SHI, Binxing FANG
    • The New Results of Correlation Attack on A5/1

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Hadi Khorrami, Mahmoud Ahmadian, Behrouz Hajian
    • Trust Value Assignment Using Model-based Testing

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Jianguo Chen, Xiaozhu Chen, Stefan Bruda
    • First
    • Previous
    • 1
    • 2
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico