Search
Selected: All

A Secure Traitor Tracing Scheme against Key Exposure

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Secure Variant of the Hill Cipher

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Secure Web-Based File Exchange Server: Software Requirements Specification Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Secure Wireless Routing Protocol Using Enhanced Chain Signatures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A secured Cryptographic Hashing Algorithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Security Protocol for Multi-User Authentication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A security suite for wireless body area networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Semantic Hierarchy for Erasure Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Sensitive Attribute based Clustering Method for kanonymization

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Service-Centric Approach to a Parameterized RBAC Service

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A simple generalization of El-Gamal cryptosystem to non-abelian groups

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A simple generalization of the ElGamal cryptosystem to non-abelian groups II

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Study of CAPTCHAs for Securing Web Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Study on Recent Approaches in Handling DDoS Attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Survey of RFID Authentication Protocols Based on Hash-Chain Method

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.