Search
Selected: All

Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

PKI Scalability Issues

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Planning for Directory Services in Public Key Infrastructures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Platform-Independent Firewall Policy Representation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Plug-in privacy for Smart Metering billing

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Plugging Side-Channel Leaks with Timing Information Flow Control

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Poseidon: a 2-tier Anomaly-based Intrusion Detection System

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Practical Schemes For Privacy & Security Enhanced RFID

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Prediciendo el generador cuadratico (in Spanish)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Predicting the Presence of Internet Worms using Novelty Detection

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Pretty-Simple Password-Authenticated Key-Exchange Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Preventing Coordinated Attacks Via Distributed Alert Exchange

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Prevention of Wormhole Attack in Wireless Sensor Network

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.