Search
Selected: I

Improved information security using robust Steganography system

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved Latin Square based Secret Sharing Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved Upper Bounds for the Information Rates of the Secret Sharing Schemes Induced by the Vamos Matroid

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improved Watermarking Scheme Using Decimal Sequences

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improvements to time bracketed authentication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improving Anonymity in Shared Key Primitives Based on Perfect Hash Families

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improving Integral Cryptanalysis against Rijndael with Large Blocks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improving random number generators by chaotic iterations. Application in data hiding

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method

Computer Science – Cryptography and Security
Scientific paper

  [ 4.20 ] – very good Voters 1   Comments 1

Improving Spam Detection Based on Structural Similarity

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Improving the Usability of Privacy Settings in Facebook

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

In Things We Trust? Towards trustability in the Internet of Things

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Incidence Handling and Response System

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Increased security through open source

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

INDECT Advanced Security Requirements

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Influence of Speech Codecs Selection on Transcoding Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Informal specification-based performance evaluation of security protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Information Flow Safety in Multiparty Sessions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.