Search
Selected: A

A security suite for wireless body area networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Semantic Hierarchy for Erasure Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Sensitive Attribute based Clustering Method for kanonymization

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Service-Centric Approach to a Parameterized RBAC Service

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A simple generalization of El-Gamal cryptosystem to non-abelian groups

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A simple generalization of the ElGamal cryptosystem to non-abelian groups II

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Study of CAPTCHAs for Securing Web Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Study on Recent Approaches in Handling DDoS Attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of RFID Authentication Protocols Based on Hash-Chain Method

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of System Security in Contactless Electronic Passports

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey on Cross-Site Scripting Attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey on Low-cost RFID Authentication Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey on Recognition Based Graphical User Authentication Algorithms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.