Analysis and Modifications of the Conditional Correlation Attack | ||
An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code | ||
An e-Learning Strategy for Africa based on Open Source Experience in Europe | ||
Alternativnetze: Probleme und Lösungsansätze | ||
Access Key Distribution Scheme for Level-based Hierarchy, Proceedings of the Forth International Conference on Parallel and Distributed Computing, Applications and Technologies | ||
A Simple and New Algorithm for Capacity Related Reliability Analysis of ATM Transport Networks | ||
A phase model for e-commerce business models and its application to security assessment |
Login Publications
If you login you can download the publications directly. Please contact Prof. Kaderali to access.
Prof. Firoz Kaderali | |