Search
Selected: F

Fine-Grained Authorization for Job Execution in the Grid: Design and Implementation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fingerprint Recognition Using Minutia Score Matching

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fingerprint Verification based on Gabor Filter Enhancement

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall Configuration Errors Revisited

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Flexible Authentication in Vehicular Ad hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formal Analysis of UMTS Privacy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formal security analysis of registration protocols for interactive systems: a methodology and a case of study

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formal Verification of Differential Privacy for Interactive Systems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formalization of malware through process calculi

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Software Requirements Specification Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.