Proceedings of the 2nd ACM workshop on ASIA public-key cryptography |
- pisbn : 978-1-4503-2801-2
- doi : 10.1145/2600694
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration |
- pisbn : 978-1-60558-778-3
- doi : 10.1145/1655062
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Computer security architectures |
- pisbn : 978-1-60558-300-6
- doi : 10.1145/1456508
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Continuous archival and retrieval of personal experiences |
- pisbn : 978-1-59593-246-4
- doi : 10.1145/1099083
|
Fulltext
|
Proceedings of the 2nd ACM workshop on High performance mobile opportunistic systems |
- pisbn : 978-1-4503-2372-7
- doi : 10.1145/2507908
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy |
- pisbn : 978-1-4503-2003-0
- doi : 10.1145/2463183
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Improving non english web searching |
- pisbn : 978-1-60558-416-4
- doi : 10.1145/1460027
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Information credibility on the web |
- pisbn : 978-1-60558-259-7
- doi : 10.1145/1458527
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Information hiding and multimedia security |
- pisbn : 978-1-4503-2647-6
- doi : 10.1145/2600918
|
Fulltext
|
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence |
- pisbn : 978-1-4503-0157-2
- doi : 10.1145/1877972
|
Fulltext
|