Search
Selected: All

A Graphical Password Based System for Small Mobile Devices

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Group Signature Based Electronic Toll Pricing System

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Hash of Hash Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Holistic Approach to Securing Web Applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Key Distribution Scheme for Sensor Networks Using Structured Graphs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Learning-Based Approach to Reactive Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Logic for Reasoning about Digital Rights

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Logic for SDSI's Linked Local Name Spaces

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A logical reconstruction of SPKI

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Model for Remote Access and Protection of Smartphones using Short Message Service

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Modeling Framework for Generating Security Protocol Specifications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

A Modified ck-Secure Sum Protocol for Multi-Party Computation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.