Current Search:  Computer security (x)

View All Items

  • CSV Spreadsheet
(41 - 60 of 83)

Pages

Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks
MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS
method for adding multimedia knowledge for improving intrusion detection systems
A Study on Partially Homomorphic Encryption Schemes
Compliance Issues In Cloud Computing Systems
Web-based wireless sensor network monitoring using smartphones
Secure routing in wireless sensor networks
Cryptography in the presence of key-dependent messages
algebraic attack on block ciphers
discrete logarithm problem in non-abelian groups
Adaptive two-level watermarking for binary document images
Secure access of legacy databases from the Web using CORBA
Message authentication in an identity-based encryption scheme
Software decomposition for multicore architectures
AN EFFECTIVE ENSEMBLE LEARNING-BASED REAL-TIME INTRUSION DETECTION SCHEME FOR IN-VEHICLE NETWORK
uncertainty-aware reputation system in mobile networks
Elliptic curves: identity-based signing and quantum arithmetic
Shamir's secret sharing scheme using floating point arithmetic
Reputation and trust-based security in wireless sensor networks
Implementation of the IEEE 1609.2 WAVE Security Services Standard

Pages