Search
Selected: F

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Failure of A Mix Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fair Exchange in Strand Spaces

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Faked states attack and quantum cryptography protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast generators for the Diffie-Hellman key agreement protocol and malicious standards

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast, parallel and secure cryptography algorithm using Lorenz's attractor

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FauxCrypt - A Method of Text Obfuscation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fighting Online Click-Fraud Using Bluff Ads

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Final Architecture Specification of security, privacy, and incentive mechanisms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finding low-weight polynomial multiples using discrete logarithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finding passwords by random walks: How long does it take?

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finding Traitors in Secure Networks Using Byzantine Agreements

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fine-Grain Authorization for Resource Management in the Grid Environment

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.