Search
Selected: E

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Evaluating the Utility of Anonymized Network Traces for Intrusion Detection

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Evaluating Trust in Grid Certificates

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Evaluation of Anonymized ONS Queries

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey

Computer Science – Cryptography and Security
Scientific paper

  [ 4.35 ] – excellent Voters 1   Comments 1

Evolutionary Computation Algorithms for Cryptanalysis: A Study

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exception Agent Detection System for IP Spoofing Over Online Environments

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exchanging Secrets without Using Cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Expected loss analysis of thresholded authentication protocols in noisy conditions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Experimenting with the Novel Approaches in Text Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 5.00 ] – superior Voters 1   Comments 1

Explicit formulas for efficient multiplication in F_{3^{6m}}

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploring Linkablility of Community Reviewing

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Expressing Security Properties Using Selective Interleaving Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending the Trusted Path in Client-Server Interaction

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending WS-Security to Implement Security Protocols for Web Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.