Search Result Save to File Save as CSV
Your search for 38168 returns 2778 document(s)
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Signaling-oriented DoS attack in UMTS networks,(LNCS-Lecture Notes in Computer Science 5576) Hal. 280-289
Author: Georgios Kambourakis; Constantinos Kolias; Stefanos Gritzalis; and Jong Hyuk-Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combating index poisoning in P2P file sharing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 358-367
Author: Lingli Deng; Yeping He; Ziyano Xu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next