Search
Selected: All

Decoding square-free Goppa codes over $\F_p$

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Deducing Security Goals From Shape Analysis Sentences

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defense Strategies Against Modern Botnets

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Defining a Comprehensive Threat Model for High Performance Computational Clusters

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of a Novel Digital Image Encryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.2

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Implementation of a High Quality and High Throughput TRNG in FPGA

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design and Performance Analysis of Unified Reconfigurable Data Integrity Unit for Mobile Terminals

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design Method for Constant Power Consumption of Differential Logic Circuits

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of an Automated Intrusion Detection System incorporating an Alarm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of an Efficient Neural Key Distribution Centre

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Design of Transport Layer Based Hybrid Covert Channel Detection Engine

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting Bots Based on Keylogging Activities

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detecting DNS Tunnels Using Character Frequency Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.