toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing. (Vol. 87, pp. 27–34). Soft Computing Models in Industrial and Environmental Applications, 6th International Conference.
toggle visibility
Connors, M. (2004). Athabasca University and AUGO Report to COSPAR. Space Science Researc, , 27–31.
toggle visibility
Connors, M. (1971). The R Corona Borealis Stars.65, L27–L28.
toggle visibility
Esmahi, L., Impey, R. & Liscano, R. (2000). Toward a mobile work environment. The second international workshop on mobile agents for telecommunication applications, , 27–47.
toggle visibility
Glass, G., & Kumar, V. S. (2013). Culture of Software. (pp. 27–28). Presentation at the 1st International Graduate Research Workshop on Adaptivity and Personalization i.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print