Amanote Research

Amanote Research

    RegisterSign In

Applications and Techniques in Information and Network Security

Concurrency Computation Practice and Experience - United Kingdom
doi 10.1002/cpe.4351
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer NetworksCommunicationsComputer Science ApplicationsComputational TheoryMathematicsTheoretical Computer ScienceSoftware
Date

October 15, 2017

Authors
Jemal H. AbawajyRafiqul Islam
Publisher

Wiley


Related search

Information Security and Management in Social Network

2012English

A Pragmatic Analysis on Cryptography in Network Security and Forensic Applications

International Journal of Research in Engineering and Technology
2016English

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

Low-Power Techniques for Network Security Processors

2005English

Modeling of Information Security System in Computer Network

Information systems and technologies security
2019English

Integrated Proactive Forensics Model in Network Information Security

2014English

Delegating Network Security With More Information

2009English

Implementing Information Security Mechanism Over Cloud Network

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

Information Security. 1. Information Security and Cryptography.

The Journal of the Institute of Television Engineers of Japan
1988English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy