Search
Selected: All

How to prevent type-flaw attacks on security protocols under algebraic properties

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to retrieve priced data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Work with Honest but Curious Judges? (Preliminary Report)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How Unique and Traceable are Usernames?

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

HowTo Authenticate and Encrypt

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hybrid Spam Filtering for Mobile Communication

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification with Encrypted Biometric Data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying Tipping Points in a Decision-Theoretic Model of Network Security

Computer Science – Cryptography and Security
Scientific paper

  [ 4.05 ] – very good Voters 1   Comments 1

Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Encryption Based on Diffusion and Multiple Chaotic Maps

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Encryption Using Differential Evolution Approach in Frequency Domain

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Image Steganography, a New Approach for Transferring Security Information

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impact of Rushing attack on Multicast in Mobile Ad Hoc Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impact of Vehicular Communications Security on Transportation Safety

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Impersonation with the Echo Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Implementing a Unification Algorithm for Protocol Analysis with XOR

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.