The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 32,
Issue 2
Volume 32,
Issue 1
Volume 31,
Issue 6
Volume 31,
Issue 5
Volume 31,
Issue 4
Volume 31,
Issue 3
Volume 31,
Issue 2
Volume 31,
Issue 1
Volume 30,
Issue 6
Volume 30,
Issue 5
Volume 30,
Issue 4
Volume 30,
Issue 3
Volume 30,
Issue 2
Volume 30,
Issue 1
Volume 29,
Issue 6
Volume 29,
Issue 5
Volume 29,
Issue 4
Volume 29,
Issue 3
Volume 29,
Issue 2
Volume 29,
Issue 1
Volume 28,
Issue 6
Volume 28,
Issue 4
Volume 28,
Issue 3
Volume 28,
Issue 2
Volume 28,
Issue 1
Volume 27,
Issue 4
Volume 27,
Issue 3
Volume 27,
Issue 2
Volume 27,
Issue 1
Volume 26,
Issue 6
Volume 26,
Issue 5
Volume 26,
Issue 4
Volume 26,
Issue 3
Volume 26,
Issue 2
Volume 26,
Issue 1
Volume 25,
Issue 6
Volume 25,
Issue 5
Volume 25,
Issue 4
Volume 25,
Issue 3
Volume 25,
Issue 2
Volume 25,
Issue 1
Volume 24,
Issue 6
Volume 24,
Issue 5
Volume 24,
Issue 4
Volume 24,
Issue 3
Volume 24,
Issue 2
Volume 24,
Issue 1
Volume 23,
Issue 6
Volume 23,
Issue 5
Volume 23,
Issue 4
Volume 23,
Issue 3
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 6
Volume 22,
Issue 5
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 6
Volume 21,
Issue 5
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 6
Volume 20,
Issue 5
Volume 20,
Issue 4
Volume 20,
Issue 3
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 6
Volume 19,
Issue 5
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 6
Volume 18,
Issue 5
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 6
Volume 17,
Issue 5
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 6
Volume 16,
Issue 5
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 6
Volume 15,
Issue 5
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 6
Volume 14,
Issue 5
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 6
Volume 13,
Issue 5
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 6
Volume 12,
Issue 5
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 4
Volume 3,
Issue 3
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 4
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 4
Volume 1,
Issue 3
Volume 1,
Issue 2
Volume 1,
Issue 1
>
Table of contents
273
Lattice-based remote user authentication from reusable fuzzy signature
Tian, Yangguang
/ Li, Yingjiu
/ Deng, Robert H.
et al.
| 2021
299
Resource and timing aspects of security protocols
Aires Urquiza, Abraão
/ Alturki, Musab A.
/ Ban Kirigin, Tajana
et al.
| 2021
341
A new approach for detecting violation of data plane integrity in Software Defined Networks
Hessam, Ghandi
/ Saba, Ghassan
/ Alkhayat, M. Iyad
et al.
| 2021
359
Research perspectives on fully homomorphic encryption models for cloud sector
Mittal, Sonam
/ Ramkumar, K.R.
et al.
| 2021