Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Agent Based Trust Management Model Based on Weight Value Model for Online Auctions E.Sathiyamoorthy
2009
3 p. 15-31
artikel
2 An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification Ferdous A Barbhuiya
2011
3 p. 163-180
artikel
3 AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM Y.Bhavani
2010
3 p. 132-142
artikel
4 AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERROR CONCEALMENT Amit Phadikar
2010
3 p. 169-188
artikel
5 A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords Dhananjay Kulkarni
2010
3 p. 1-16
artikel
6 APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION Rajkumar P.V
2009
3 p. 116-128
artikel
7 A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT Johnneth Fonseca
2009
3 p. 90-107
artikel
8 Authentication Schemes for Session Passwords Using Color and Images M Sreelatha
2011
3 p. 111-119
artikel
9 BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK S. Albert Raebra
2010
3 p. 119-130
artikel
10 Countermeasure Tool - Carapace for Network Security Anand Bisen
2011
3 p. 16-28
artikel
11 Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment Nirmal Dagdee
2011
3 p. 42-56
artikel
12 CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NEXT GENERATION HIGH RATE WPAN Ayman Khalil
2010
3 p. 18-34
artikel
13 CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed
2009
3 p. 32-37
artikel
14 Data Security in Mobile Devices by GEO Locking M Prabu Kumar
2009
3 p. 52-61
artikel
15 Data Security Using Private Key Encryption System Based on Arithmetic Coding Ajit Singh
2011
3 p. 58-67
artikel
16 DDoS Attack and Defense Scheme in Wireless Ad hoc Networks S.A.Arunmozhi
2011
3 p. 182-187
artikel
17 DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS Theodore Zahariadis
2010
3 p. 52-68
artikel
18 Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment K R Chandrasekhara Pillai
2010
3 p. 144-146
artikel
19 Enterprise Delegation for Service Based Systems Coimbatore Chandersekaran
2011
3 p. 138-161
artikel
20 HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK Mohammad Saiful Islam Mamun
2010
3 p. 102-117
artikel
21 IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY Mohamed Elboukhari
2010
3 p. 87-100
artikel
22 INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION Mohamed Abid
2009
3 p. 01-13
artikel
23 INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS Pavaday Narainsamy
2010
3 p. 70-85
artikel
24 Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN Asis Kumar Tripathy
2011
3 p. 98-109
artikel
25 Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers Chang N. Zhang
2010
3 p. 36-50
artikel
26 On Design of PUF-Based Random Number Generators Mehdi Ayat
2011
3 p. 30-40
artikel
27 Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services Urjita Thakar
2010
3 p. 190-205
artikel
28 PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP Moheb r. Girgis
2009
3 p. 63-73
artikel
29 PKI in Government Identity Management Systems Ali M. Al-Khouri
2011
3 p. 69-96
artikel
30 PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS Yasir Arfat Malkani
2009
3 p. 39-50
artikel
31 Securing AODV for MANETs using Message Digest with Secret Key Mr. Kamaljit Lakhtaria
2009
3 p. 111-116
artikel
32 SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK Jean-François Lalande
2009
3 p. 73-89
artikel
33 System Dynamics Based Insider Threats Modelin Sang-Chin Yang
2011
3 p. 1-14
artikel
34 Transformation from Identity Stone Age to Digital Identity Mohit Kohli
2011
3 p. 121-136
artikel
35 TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET Ahmed M. Abd El-Haleem
2011
3 p. 189-204
artikel
36 WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX Reza Amirpoor
2010
3 p. 158-167
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland