Search
Selected: All

Refinement of Strategy and Technology Domains STOPE View on ISO 27001

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reflection Scan: an Off-Path Attack on TCP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Refuting the Pseudo Attack on the REESSE1+ Cryptosystem

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reidentification and k-anonymity: a model for disclosure risk in graphs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Relating two standard notions of secrecy

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reliable Process for Security Policy Deployment

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Replication Attack Mitigations for Static and Mobile WSN

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Report on the "Secure Vehicular Communications: Results and Challenges Ahead" Workshop

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reputation- and Trust-Based Systems for Wireless Self-organizing Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Retransmission Steganography Applied

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reversible Logic to Cryptographic Hardware: A New Paradigm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Review of Lattice-based Public key Cryptography(Russian)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Review of syn-flooding attack detection mechanism

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Revisiting Fermat's Factorization for the RSA Modulus

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Revisiting LFSMs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.