Current Search:  Computer networks -- Access control (x)

View All Items

  • CSV Spreadsheet
(1 - 9 of 9)
Password-authenticated two-party key exchange with long-term security
Resource-sensitive intrusion detection models for network traffic
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
Web services cryptographic patterns
study of Internet-based control of processes
Controlling access to physical locations
A Study on Partially Homomorphic Encryption Schemes
method for adding multimedia knowledge for improving intrusion detection systems
Modeling access control of medical information