Search
Selected: All

Steganography in Handling Oversized IP Packets

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Steganography: a class of secure and robust algorithms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stegobot: construction of an unobservable communication network leveraging social behavior

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stimulating Cooperation in Self-Organized Vehicular Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stochastic Games for Security in Networks with Interdependent Nodes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

STor: Social Network based Anonymous Communication in Tor

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

STP/HAMPI and Computer Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stream cipher based on quasigroup string transformations in $Z_p^*$

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stream Control Transmission Protocol Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stronger Enforcement of Security Using AOP and Spring AOP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly secure ramp secret sharing schemes for general access structures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Studying and Classification of the Most Significant Malicious Software

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Successful attack on PPM-based neural cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Symbian `vulnerability' and Mobile Threats

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.