Search
Selected: All

Formal security analysis of registration protocols for interactive systems: a methodology and a case of study

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formal Verification of Differential Privacy for Interactive Systems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Formalization of malware through process calculi

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Software Requirements Specification Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Full Restoration of Visual Encrypted Color Images

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fully Countering Trusting Trust through Diverse Double-Compiling

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with State Security

Computer Science – Cryptography and Security
Scientific paper

  [ 5.00 ] – superior Voters 1   Comments 1

Functional Programming and Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Further Results on the Distinctness of Decimations of l-sequences

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fusion Discrete Logarithm Problems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fuzzy Private Matching (Extended Abstract)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Gaming security by obscurity

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.