يعرض 1 - 20 نتائج من 752 نتيجة بحث عن '"rekeying"', وقت الاستعلام: 0.78s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Academic Journal
  4. 4
    Academic Journal
  5. 5
    Academic Journal
  6. 6
    Academic Journal
  7. 7
    Academic Journal

    المساهمون: Heuristique et Diagnostic des Systèmes Complexes Compiègne (Heudiasyc), Université de Technologie de Compiègne (UTC)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Excellence "Maîtrise des Systèmes de Systèmes Technologiques" (Labex MS2T)

    المصدر: ISSN: 0045-7906 ; Computers and Electrical Engineering ; https://hal.science/hal-03509576 ; Computers and Electrical Engineering, 2021, 91, pp.107021. ⟨10.1016/j.compeleceng.2021.107021⟩.

  8. 8
    Academic Journal
  9. 9
    Dissertation/ Thesis

    المؤلفون: Momin, Charles

    المساهمون: UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique, UCL - Ecole Polytechnique de Louvain, Standaert, François-Xavier, Guilley, Sylvain, Moradi, Amir, Peters, Thomas, Bol, David

    Relation: boreal:285361; http://hdl.handle.net/2078.1/285361

  10. 10
    Academic Journal
  11. 11
    Academic Journal
  12. 12
    Academic Journal

    المساهمون: Laboratoire de Méthodes de Conception de Systèmes (LMCS), École Nationale Supérieure d'Informatique Alger (ESI), Centre de recherche sur l'Information Scientifique et Technique (CERIST), Ministère de l'Education nationale, de l’Enseignement supérieur et de la Recherche (M.E.N.E.S.R.), Heuristique et Diagnostic des Systèmes Complexes Compiègne (Heudiasyc), Université de Technologie de Compiègne (UTC)-Centre National de la Recherche Scientifique (CNRS), Center of Excellence in Information Assurance (CoEIA), King Saud University Riyadh (KSU)

    المصدر: ISSN: 1389-1286 ; Computer Networks ; https://hal.science/hal-01703093 ; Computer Networks, 2018, 132, pp.161-179. ⟨10.1016/j.comnet.2018.01.010⟩.

  13. 13
    Academic Journal

    المؤلفون: Seetha R., Saravanan R.

    المصدر: Cybernetics and Information Technologies, Vol 15, Iss 3, Pp 3-25 (2015)

    مصطلحات موضوعية: group key, security, rekeying, multicast, key management, Cybernetics, Q300-390

    وصف الملف: electronic resource

  14. 14
  15. 15
    Academic Journal
  16. 16
  17. 17
  18. 18
    Conference

    المؤلفون: Renugadevi, N., Mala, C.

    المساهمون: National Institute of Technology Tiruchirappalli, Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You, TC 5, TC 8, WG 8.9

    المصدر: Lecture Notes in Computer Science ; 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS) ; https://hal.inria.fr/hal-01466215 ; 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.161-172, ⟨10.1007/978-3-319-24315-3_16⟩

    جغرافية الموضوع: Daejon, South Korea

  19. 19
  20. 20