Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Çamtepe, Seyit Ahmet"'
Autor:
Çamtepe, Seyit Ahmet
IV ÖZET SIP UYGULAMALARINDA KERBEROS TEMELLİ GÜVENLİK SİSTEMİ SIP, IP ağlan üzerinden ses uygulamalarını sunmak amacıyla tasarlanmıştır. SIP, ses ve veri dünyasını bir araya getirerek, telefon görüşmelerinin özel İP ağları vey
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_____10208::9ad0f4fd9e19d6a122b9857627c1c5f8
https://acikbilim.yok.gov.tr/handle/20.500.12812/78911
https://acikbilim.yok.gov.tr/handle/20.500.12812/78911
Autor:
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Masuzawa, Toshimitsu, Tixeuil, Sébastien, Bye, Rainer, Luther, Katja, Çamtepe, Seyit Ahmet
Publikováno v:
Stabilization, Safety & Security of Distributed Systems (9783540766261); 2007, p37-51, 15p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Steele, Joe
There has never been a Mobile Security Guide like this. It contains 34 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the informatio
There has never been a IT Risk Management Guide like this. It contains 206 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the inform
Autor:
Anthony, Larry
There has never been a Risk Assessment Guide like this. It contains 221 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the informati
Autor:
Harrison, Roy
Wireless security'is the averting of non-authorized access either harm to computers utilizing wireless networks. The most commonplace kinds of wireless safeguarding are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notorio
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in September 2011. The 30 revised full papers were careful
Autor:
Toshimitsu Masuzawa, Sébastien Tixeuil
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the