Cited By
View all- Razouki HHair A(2013)Components-based software architecture for secure mobile agents via two strategies of adaptation2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)10.1109/SITA.2013.6560821(1-7)Online publication date: May-2013
- Ren YBoukerche APazzi R(2010)Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks2010 IEEE Global Telecommunications Conference GLOBECOM 201010.1109/GLOCOM.2010.5684001(1-5)Online publication date: Dec-2010
- Viejo ACastellà-Roca J(2010)Using social networks to distort users’ profiles generated by web search enginesComputer Networks10.1016/j.comnet.2009.11.00354:9(1343-1357)Online publication date: Jun-2010
- Show More Cited By