Search
Selected: M

M-Banking Security - a futuristic improved security approach

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Making Hand Geometry Verification System More Accurate Using Time Series Representation with R-K Band Learning

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Making Palm Print Matching Mobile

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Making Random Choices Invisible to the Scheduler

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Malicious cryptography techniques for unreversable (malicious or not) binaries

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Malware Classification based on Call Graph Clustering

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Managing Delegation in Access Control Models

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Managing key multicasting through orthogonal systems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Mathematical and Statistical Opportunities in Cyber Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Matrix powers algorithms for trust evaluation in PKI architectures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Maximizing Strength of Digital Watermarks using Fuzzy Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Measuring Password Strength: An Empirical Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Message Detection and Extraction of Chaotic Optical Communication Using Time-Frequency Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature

Computer Science – Cryptography and Security
Scientific paper

  [ 4.90 ] – superior Voters 1   Comments 1

Metamorphic Virus Variants Classification Using Opcode Frequency Histogram

Computer Science – Cryptography and Security
Scientific paper

  [ 4.70 ] – excellent Voters 1   Comments 1

MIMO-Assisted Channel-Based Authentication in Wireless Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Min-Sum algorithm for lattices constructed by Construction D

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.