


default search action
Transactions on Computational Science, Volume 11, 2010
- Marina L. Gavrilova, Chih Jeng Kenneth Tan, Edward D. Moreno:
Transactions on Computational Science XI - Special Issue on Security in Computing, Part II. Lecture Notes in Computer Science 6480, Springer 2010, ISBN 978-3-642-17696-8 - Celia Li, Zhuang Wang, Cungang Yang:
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks. 1-16 - Sven Lachmund, Gregor Hengst:
Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. 17-38 - Frederik Armknecht
, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann:
Impossibility Results for RFID Privacy Notions. 39-63 - Ricardo José Menezes Maia, Paulo Sérgio Licciardi Messeder Barreto, Bruno Trevizan de Oliveira:
Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network. 64-78 - Vladimir Trujillo-Olaya
, Jaime Velasco-Medina
:
Hardware Architectures for Elliptic Curve Cryptoprocessors Using Polynomial and Gaussian Normal Basis over GF(2233). 79-103 - Owen Harrison, John Waldron:
GPU Accelerated Cryptography as an OS Service. 104-130 - Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard:
From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems. 131-161 - Fábio Dacêncio Pereira, Edward D. Moreno:
Performance Issues on Integration of Security Services. 162-178 - André Proto, Leandro A. Alexandre, Maira L. Batista, Isabela L. Oliveira, Adriano M. Cansian:
Statistical Model Applied to NetFlow for Network Intrusion Detection. 179-191 - Feng Hao
, Peter Y. A. Ryan
:
J-PAKE: Authenticated Key Exchange without PKI. 192-206 - P. T. V. Bhuvaneswari, Vijay Vaidehi, M. Agnes Saranya:
Distance Based Transmission Power Control Scheme for Indoor Wireless Sensor Network. 207-222 - Paul Raymond Nicholl, Afandi Ahmad
, Abbes Amira:
A Novel Feature Vectors Construction Approach for Face Recognition. 223-248 - Heidar Pirzadeh, Danny Dubé, Abdelwahab Hamou-Lhadj
:
An Extended Proof-Carrying Code Framework for Security Enforcement. 249-269 - Sarabjeet Singh Bedi, Shekhar Verma
, Geetam S. Tomar
:
NPT Based Video Watermarking with Non-overlapping Block Matching. 270-292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.