Your search for 40568 returns 2412 document(s) |
Improved implementations of cryptosystems based on tate pairing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 145-158 |
Author: Chang An Zhao; Dongqing Xie; Fangguo Zhang; Chong Zhi Gao; Jingwei Zhang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Clustering-based frequency i-diversity anonymization,(LNCS-Lecture Notes in Computer Science 5576) Hal. 159-168 |
Author: Mohammad Reza; Zare-Mirakabad; Aman Jantan; Stephane Bressan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Kademlia-based node lookup system for anonymization networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 179-190 |
Author: Benedikt Westermann; Andriy Panchenko; Lexi Pimenidis; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199 |
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222 |
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279 |
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Signaling-oriented DoS attack in UMTS networks,(LNCS-Lecture Notes in Computer Science 5576) Hal. 280-289 |
Author: Georgios Kambourakis; Constantinos Kolias; Stefanos Gritzalis; and Jong Hyuk-Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|