|
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing. (Vol. 87, pp. 27–34). Soft Computing Models in Industrial and Environmental Applications, 6th International Conference.
|
|
|
Connors, M. (2004). Athabasca University and AUGO Report to COSPAR. Space Science Researc, , 27–31.
|
|
|
Connors, M. (1971). The R Corona Borealis Stars.65, L27–L28.
|
|
|
Esmahi, L., Impey, R. & Liscano, R. (2000). Toward a mobile work environment. The second international workshop on mobile agents for telecommunication applications, , 27–47.
|
|
|
Glass, G., & Kumar, V. S. (2013). Culture of Software. (pp. 27–28). Presentation at the 1st International Graduate Research Workshop on Adaptivity and Personalization i.
|
|