Current Search:  Computer security (x)

View All Items

  • CSV Spreadsheet
(61 - 80 of 82)

Pages

Event detection in surveillance video
Adaptive power control in 802.11 networks
class-based search system in unstructured peer-to-peer networks
An innovative pixel scoring method for watermarking of binary document images
New approaches to encryption and steganography for digital videos
Content identification using video tomography
Deep Learning for Android Application Ransomware Detection
Object detection in low resolution video sequences
A Biometrics Based Secure Communication Scheme for Bluetooth Environment
Signature schemes in single and multi-user settings
Smart campus
authorization model for object-oriented and semantic databases
VoIP Network Security and Forensic Models using Patterns
Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks
Physical Layer Security of Wireless Transmissions Over Fading Channels
Patterns for secure interactions in social networks in Web 2.0
Efficient implementation of zero-knowledge based identification protocols
Energy Efficient Cluster-Based Target Tracking Strategy
Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem
Energy cost evaluation of a secure 802.11 wireless transmission using NS-2

Pages