#access-control

icon subthematics
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
Category

Documents

Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage

Bruno Blanchet

Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage Alternate Text
Category

Documents

Rapports de stage

Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage

Bruno Blanchet

Book

15 pages

Flag

English

Stochastic geometry and wireless ad hoc networks
Category

Documents

Stochastic geometry and wireless ad hoc networks

Isaac Newton Institute

Stochastic geometry and wireless ad hoc networks Alternate Text
Category

Documents

Cours

Stochastic geometry and wireless ad hoc networks

Isaac Newton Institute

Book

173 pages

Flag

English

Inconsistency resolving of safety and utility in access control
Category

Documents

Inconsistency resolving of safety and utility in access control

Lu Jianfeng, Li Ruixuan, Hu Jinwei, Xu Dewu, Xu

Inconsistency resolving of safety and utility in access control Alternate Text
Category

Documents

Savoirs

Inconsistency resolving of safety and utility in access control

Lu Jianfeng, Li Ruixuan, Hu Jinwei, Xu Dewu, Xu

Book

12 pages

Flag

English

MODÉLISATION STOCHASTIQUE DES PROTOCOLES
Category

Documents

MODÉLISATION STOCHASTIQUE DES PROTOCOLES

MODÉLISATION STOCHASTIQUE DES PROTOCOLES Alternate Text
Category

Documents

Cours

MODÉLISATION STOCHASTIQUE DES PROTOCOLES

Book

107 pages

Flag

English

On Access Control in the Internet of Things
Category

Documents

On Access Control in the Internet of Things

Jan Janak

On Access Control in the Internet of Things Alternate Text
Category

Documents

Etudes supérieures

On Access Control in the Internet of Things

Jan Janak

Book

3 pages

Flag

English

  • 1
Alternate Text