Search
Selected: S

Stream cipher based on quasigroup string transformations in $Z_p^*$

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stream Control Transmission Protocol Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Stronger Enforcement of Security Using AOP and Spring AOP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Strongly secure ramp secret sharing schemes for general access structures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Studying and Classification of the Most Significant Malicious Software

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Successful attack on PPM-based neural cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Symbian `vulnerability' and Mobile Threats

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Symbolic Protocol Analysis for Diffie-Hellman

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Synthesis of Binary k-Stage Machines

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Synthesis of Parallel Binary Machines

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.