Search
Selected: All

Maximizing Strength of Digital Watermarks using Fuzzy Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Measuring Password Strength: An Empirical Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Message Detection and Extraction of Chaotic Optical Communication Using Time-Frequency Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature

Computer Science – Cryptography and Security
Scientific paper

  [ 4.90 ] – superior Voters 1   Comments 1

Metamorphic Virus Variants Classification Using Opcode Frequency Histogram

Computer Science – Cryptography and Security
Scientific paper

  [ 4.70 ] – excellent Voters 1   Comments 1

MIMO-Assisted Channel-Based Authentication in Wireless Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Min-Sum algorithm for lattices constructed by Construction D

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Misbehavior in Mobile Application Markets

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Mistake Analyses on Proof about Perfect Secrecy of One-time-pad

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Mitigation of Random Query String DoS via Gossip

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Mobile IP and protocol authentication extension

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modeling Adversaries in a Logic for Security Protocol Analysis

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modelling the costs and benefits of Honeynets

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modern Quantum Technologies of Information Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Modern Symmetric Cryptography methodologies and its applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.