Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups Zhang, Leyou
2012
55 1-2 p. 12-18
7 p.
artikel
2 Advanced theory and practice for cryptography and future security Preneel, Bart
2012
55 1-2 p. 1-2
2 p.
artikel
3 A new construction of the server-aided verification signature scheme Wang, Zhiwei
2012
55 1-2 p. 97-101
5 p.
artikel
4 A new multistage approach to detect subtle DDoS attacks Wang, Fei
2012
55 1-2 p. 198-213
16 p.
artikel
5 A novel method for SQL injection attack detection based on removing SQL query attribute values Lee, Inyong
2012
55 1-2 p. 58-68
11 p.
artikel
6 A novel user authentication and privacy preserving scheme with smart cards for wireless communications Li, Chun-Ta
2012
55 1-2 p. 35-44
10 p.
artikel
7 A photographic forensic case study: Myths, principles and techniques Kim, Hyoung Joong
2012
55 1-2 p. 3-11
9 p.
artikel
8 A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine Lim, Sungsu
2012
55 1-2 p. 151-160
10 p.
artikel
9 AS Alliance based security enhancement for inter-domain routing protocol Zhu, Peidong
2012
55 1-2 p. 241-255
15 p.
artikel
10 A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment Kim, Jangseong
2012
55 1-2 p. 45-57
13 p.
artikel
11 Authenticated public key broadcast encryption scheme secure against insiders’ attack Park, Chanil
2012
55 1-2 p. 113-122
10 p.
artikel
12 Authentication protocol using an identifier in an ad hoc network environment Moon, Jong Sik
2012
55 1-2 p. 134-141
8 p.
artikel
13 BLESS: Object level encryption security for object-based storage system Feng, Dan
2012
55 1-2 p. 188-197
10 p.
artikel
14 Differential fault analysis on block cipher SEED Jeong, Kitae
2012
55 1-2 p. 26-34
9 p.
artikel
15 Discrete logarithm problem using index calculus method Padmavathy, R.
2012
55 1-2 p. 161-169
9 p.
artikel
16 Editorial Board 2012
55 1-2 p. iii-iv
nvt p.
artikel
17 Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Mun, Hyeran
2012
55 1-2 p. 214-222
9 p.
artikel
18 Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography Vasyltsov, Ihor
2012
55 1-2 p. 256-267
12 p.
artikel
19 Improving performance of network covert timing channel through Huffman coding Wu, Jingzheng
2012
55 1-2 p. 69-79
11 p.
artikel
20 Mining constraints in role-based access control Ma, Xiaopu
2012
55 1-2 p. 87-96
10 p.
artikel
21 Modeling and quantitatively predicting software security based on stochastic Petri nets Yang, Nianhua
2012
55 1-2 p. 102-112
11 p.
artikel
22 On the number of rotation symmetric functions over G F ( p ) Fu, Shaojing
2012
55 1-2 p. 142-150
9 p.
artikel
23 On-the-spot digital investigation by means of LDFS: Live Data Forensic System Lim, Kyung-Soo
2012
55 1-2 p. 223-240
18 p.
artikel
24 On weaknesses of the HDCP authentication and key exchange protocol and its repair Zhao, Jianjie
2012
55 1-2 p. 19-25
7 p.
artikel
25 Related key chosen IV attacks on Decim v2 and Decim-128 Lin, Ding
2012
55 1-2 p. 123-133
11 p.
artikel
26 Securing mobile network prefix provisioning for NEMO based vehicular networks Lee, Jong-Hyouk
2012
55 1-2 p. 170-187
18 p.
artikel
27 Task-based behavior detection of illegal codes Han, Lansheng
2012
55 1-2 p. 80-86
7 p.
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland