default search action
Transactions on Computational Science, Volume 4, 2009
- Marina L. Gavrilova, Chih Jeng Kenneth Tan, Edward D. Moreno:
Transactions on Computational Science IV, Special Issue on Security in Computing. Lecture Notes in Computer Science 5430, Springer 2009, ISBN 978-3-642-01003-3 - Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres:
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. 1-22 - Victor P. Roche, Unai Arronategui:
Behavioural Characterization for Network Anomaly Detection. 23-40 - Feng Hao, Piotr Zielinski:
The Power of Anonymous Veto in Public Discussion. 41-52 - Emad Eldin Mohamed, Hussein M. Abdel-Wahab:
Collusion-Resistant Message Authentication in Overlay Multicast Communication. 53-67 - Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson Tavares de Camargo, Davi da Silva Böger:
A Model for Authentication Credentials Translation in Service Oriented Architecture. 68-86 - Ratna Dutta, Tom Dowling:
Secure and Efficient Group Key Agreements for Cluster Based Networks. 87-116 - Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
An Integrated ECC-MAC Based on RS Code. 117-135 - Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham:
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. 136-148 - Hind Rakkay, Hanifa Boucheneb:
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools. 149-176 - Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar:
Role Based Access Control with Spatiotemporal Context for Mobile Applications. 177-199 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior. 200-214 - Fábio Dacêncio Pereira, Edward David Moreno Ordonez:
A Hardware Architecture for Integrated-Security Services. 215-229 - Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank K. Gürkaynak, Marco Macchetti, Zeynep Toprak Deniz, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne:
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology. 230-243 - Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. 244-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.