Search
Selected: I

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification with Encrypted Biometric Data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying Tipping Points in a Decision-Theoretic Model of Network Security

Computer Science – Cryptography and Security
Scientific paper

  [ 4.05 ] – very good Voters 1   Comments 1

Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Encryption Based on Diffusion and Multiple Chaotic Maps

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Encryption Using Differential Evolution Approach in Frequency Domain

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Steganography, a New Approach for Transferring Security Information

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impact of Rushing attack on Multicast in Mobile Ad Hoc Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impact of Vehicular Communications Security on Transportation Safety

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impersonation with the Echo Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing a Unification Algorithm for Protocol Analysis with XOR

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing a Web Browser with Phishing Detection Techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing New-age Authentication Techniques using OpenID for Security Automation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing the modular eballot system V0.6

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing the Three-Stage Quantum Cryptography Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impossibility of Differentially Private Universally Optimal Mechanisms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved Analysis of Kannan's Shortest Lattice Vector Algorithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved code-based identification scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved Content Based Image Watermarking

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved identity-based identification using correcting codes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.