Search
Selected: All

Experimenting with the Novel Approaches in Text Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 5.00 ] – superior Voters 1   Comments 1

Explicit formulas for efficient multiplication in F_{3^{6m}}

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Exploring Linkablility of Community Reviewing

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Expressing Security Properties Using Selective Interleaving Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending the Trusted Path in Client-Server Interaction

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extending WS-Security to Implement Security Protocols for Web Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Failure of A Mix Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fair Exchange in Strand Spaces

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Faked states attack and quantum cryptography protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast generators for the Diffie-Hellman key agreement protocol and malicious standards

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fast, parallel and secure cryptography algorithm using Lorenz's attractor

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.