Run-time selection of security algorithms for networked devices. Taddeo, A. V. & Ferrante, A. In Mueller, P. & Cesana, M., editors, Q2SWinet, pages 92-96, 2009. ACM.
Run-time selection of security algorithms for networked devices. [link]Link  Run-time selection of security algorithms for networked devices. [link]Paper  bibtex   
@inproceedings{conf/mswim/TaddeoF09,
  added-at = {2014-09-19T00:00:00.000+0200},
  author = {Taddeo, Antonio Vincenzo and Ferrante, Alberto},
  biburl = {http://www.bibsonomy.org/bibtex/28d5164c7e13229c071c88f10b951d18e/dblp},
  booktitle = {Q2SWinet},
  crossref = {conf/mswim/2009q},
  editor = {Mueller, Peter and Cesana, Matteo},
  ee = {http://doi.acm.org/10.1145/1641944.1641963},
  interhash = {b97db26a07ed101669668d6f0a27134c},
  intrahash = {8d5164c7e13229c071c88f10b951d18e},
  isbn = {978-1-60558-619-9},
  keywords = {dblp},
  pages = {92-96},
  publisher = {ACM},
  timestamp = {2015-06-19T07:42:40.000+0200},
  title = {Run-time selection of security algorithms for networked devices.},
  url = {http://dblp.uni-trier.de/db/conf/mswim/q2swinet2009.html#TaddeoF09},
  year = 2009
}

Downloads: 0