Search
Selected: All

An attack on MySQL's login protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Audit Logic for Accountability

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Automated Analysis of the Security of Quantum Key Distribution

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An efficient certificateless authenticated key agreement protocol without bilinear pairings

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Cryptographic Hash Algorithm (BSA)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Dynamic and Distributed RSA Accumulator

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An efficient multi-use multi-secret sharing scheme based on hash function

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient PKC-Based Security Architecture for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 3.60 ] – good Voters 1   Comments 0

An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An Empirical Study of Spam and Spam Vulnerable email Accounts

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

An ensemble approach for feature selection of Cyber Attack Dataset

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.