Search
Selected: D

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defense Strategies Against Modern Botnets

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defining a Comprehensive Threat Model for High Performance Computational Clusters

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of a Novel Digital Image Encryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.2

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Implementation of a High Quality and High Throughput TRNG in FPGA

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Performance Analysis of Unified Reconfigurable Data Integrity Unit for Mobile Terminals

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design Method for Constant Power Consumption of Differential Logic Circuits

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of an Automated Intrusion Detection System incorporating an Alarm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of an Efficient Neural Key Distribution Centre

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of Transport Layer Based Hybrid Covert Channel Detection Engine

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting Bots Based on Keylogging Activities

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting DNS Tunnels Using Character Frequency Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting Security threats in the Router using Computational Intelligence

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting Threat E-mails using Bayesian Approach

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detection of Denial of Service Attacks against Domain Name System Using Neural Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.