Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network Jaydip Sen
2010
4 p. 92-104
artikel
2 ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan Muraleedharan N
2010
4 p. 234-245
artikel
3 A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN Soumya Maity
2010
4 p. 194-211
artikel
4 A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES Angel R. Otero
2010
4 p. 1-11
artikel
5 A (2,N) Visual Cryptographic Technique for Banking Applications Jayanta Kumar Pal
2010
4 p. 118-127
artikel
6 A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks Emmanouil A. Panaousis
2010
4 p. 143-162
artikel
7 Bayesian Based Comment Spam Defending Tool Dhinaharan Nagamalai
2010
4 p. 267-280
artikel
8 Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents Mueen Uddin
2010
4 p. 129-141
artikel
9 Effective Voice Calls Admission for Authorized User in Inter VOIP Network Subashri T
2010
4 p. 213-232
artikel
10 Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network Vikas Kumar
2010
4 p. 80-90
artikel
11 Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment Rafael Martínez-Peláez
2010
4 p. 106-116
artikel
12 Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique M. Kiran Kumar
2010
4 p. 30-41
artikel
13 Emergency Response Communications and Associated Security Challenges Muhammad Ibrahim Channa
2010
4 p. 179-192
artikel
14 Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks Vivaksha Jariwala
2010
4 p. 55-65
artikel
15 Improving the Reliability of Detection of LSB Replacement Steganography Shreelekshmi R
2010
4 p. 247-254
artikel
16 Lightweight C&C based botnet detection using Aho-Corasick NFA Udhayan J
2010
4 p. 164-177
artikel
17 Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld: A Characterization Danilo Valeros Bernardo
2010
4 p. 13-28
artikel
18 Security in Wireless Sensor Networks: Key Management Module in SOOAWSN Mohammed A. Abuhelaleh
2010
4 p. 67-78
artikel
19 Verification of Quantum Cryptography Protocols by Model Checking Mohamed Elboukhari
2010
4 p. 43-53
artikel
20 Zero Data Remnance Proof in Cloud Storage Mithun Paul
2010
4 p. 256-265
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland