Search
Selected: P

Poseidon: a 2-tier Anomaly-based Intrusion Detection System

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Schemes For Privacy & Security Enhanced RFID

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Prediciendo el generador cuadratico (in Spanish)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Predicting the Presence of Internet Worms using Novelty Detection

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Pretty-Simple Password-Authenticated Key-Exchange Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Preventing Coordinated Attacks Via Distributed Alert Exchange

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Prevention of Wormhole Attack in Wireless Sensor Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy Amplification and Non-Malleable Extractors Via Character Sums

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy constraints in regularized convex optimization

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy in Location Based Services: Primitives Toward the Solution

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy Preservation Technologies in Internet of Things

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy Preserving Association Rule Mining Revisited

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy Preserving Data Aggregation in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Privacy Preserving k Secure Sum Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.