Search
Selected: All

A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Workflow for Differentially-Private Graph Synthesis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Abstract Certification of Global Non-Interference in Rewriting Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Access Control for Hierarchical Joint-Tenancy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Accountable Anonymous Group Messaging

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Adaptation of the neural network-based IDS to new attacks detection

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Adding Query Privacy to Robust DHTs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Advanced exploitation of buffer overflow

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Advanced Software Protection Now

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Advanced Trace Pattern For Computer Intrusion Discovery

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

AES Encryption and Decryption Using Direct3D 10 API

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

AES Implementation and Performance Evaluation on 8-bit Microcontrollers

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Aggregating and Deploying Network Access Control Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Algebraic Attack on the Alternating Step(r,s)Generator

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Algorithmic Permutation of part of the Torah

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.