Search
Selected: All

Securing Remote Procedure Calls over HTTPS

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Securing The Kernel via Static Binary Rewriting and Program Shepherding

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Securing Tor Tunnels under the Selective-DoS Attack

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Securing U-Healthcare Sensor Networks using Public Key Based Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 3.85 ] – very good Voters 1   Comments 0

Sécurité des systèmes critiques et cybercriminalité : vers une sécurité globale ?

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security amplification by composition: The case of doubly-iterated, ideal ciphers

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Analyses of One-time System

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security analysis of a binary image permutation scheme based on Logistic map

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Analysis of two Distance-Bounding Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security and complexity of the McEliece cryptosystem based on QC-LDPC codes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security and Non-Repudiation for Voice-Over-IP Conversations

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Assessment of E-Tax Filing Websites

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Considerations for Remote Electronic Voting over the Internet

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Estimates for Quadratic Field Based Cryptosystems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Hard Problem

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Flaws in a Recent Ultralightweight RFID Protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security for Distributed Web-Applications via Aspect-Oriented Programming

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security for Grid Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security impact ratings considered harmful

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.