Pages that link to "Item:Q3558768"
From MaRDI portal
The following pages link to Advances in Information Security and Its Application (Q3558768):
Displayed 16 items.
- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections (Q3558769) (← links)
- A Security Metrics Development Method for Software Intensive Systems (Q3558771) (← links)
- The ISDF Framework: Integrating Security Patterns and Best Practices (Q3558774) (← links)
- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server (Q3558776) (← links)
- Concurrency and Time in Role-Based Access Control (Q3558779) (← links)
- Performance Assessment Method for a Forged Fingerprint Detection Algorithm (Q3558780) (← links)
- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings (Q3558782) (← links)
- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes (Q3558786) (← links)
- Context-Based E-Health System Access Control Mechanism (Q3558788) (← links)
- Analysis of a Mathematical Model for Worm Virus Propagation (Q3558791) (← links)
- A Contents Encryption Mechanism Using Reused Key in IPTV (Q3558796) (← links)
- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform (Q3558797) (← links)
- Experiment Research of Automatic Deception Model Based on Autonomic Computing (Q3558799) (← links)
- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks (Q3558801) (← links)
- Reconsidering Data Logging in Light of Digital Forensics (Q3558803) (← links)
- Blurriness in Live Forensics: An Introduction (Q3558805) (← links)