EAI Endorsed Transactions on Security and Safety, Volume 3
Volume 3, Number 7, December 2016
Neil C. Rowe:
Identifying forensically uninteresting files in a large corpus. e2 Kalikinkar Mandal,
Guang Gong:
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. e3
Volume 3, Number 8, December 2016
Volume 3, Number 9, December 2016
Volume 3, Number 10, December 2016
maintained by

, founded at
