Digitale Bibliotheek
Sluiten
Bladeren door artikelen uit een tijdschrift
Zoeken naar
Tijdschrift
Artikel
ISSN
NBN artikel
NBN tijdschrift
DARE/NARCIS document
met titel:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Tijdschrift beschrijving
Alle jaargangen van het bijbehorende tijdschrift
Alle afleveringen van het bijbehorende jaargang
Alle artikelen van de bijbehorende aflevering
36 gevonden resultaten
nr
titel
auteur
tijdschrift
jaar
jaarg.
afl.
pagina('s)
type
1
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy
2009
3
p. 15-31
artikel
2
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification
Ferdous A Barbhuiya
2011
3
p. 163-180
artikel
3
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
Y.Bhavani
2010
3
p. 132-142
artikel
4
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERROR CONCEALMENT
Amit Phadikar
2010
3
p. 169-188
artikel
5
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords
Dhananjay Kulkarni
2010
3
p. 1-16
artikel
6
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
Rajkumar P.V
2009
3
p. 116-128
artikel
7
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
Johnneth Fonseca
2009
3
p. 90-107
artikel
8
Authentication Schemes for Session Passwords Using Color and Images
M Sreelatha
2011
3
p. 111-119
artikel
9
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK
S. Albert Raebra
2010
3
p. 119-130
artikel
10
Countermeasure Tool - Carapace for Network Security
Anand Bisen
2011
3
p. 16-28
artikel
11
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment
Nirmal Dagdee
2011
3
p. 42-56
artikel
12
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NEXT GENERATION HIGH RATE WPAN
Ayman Khalil
2010
3
p. 18-34
artikel
13
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
Mohammed Aijaz Ahmed
2009
3
p. 32-37
artikel
14
Data Security in Mobile Devices by GEO Locking
M Prabu Kumar
2009
3
p. 52-61
artikel
15
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh
2011
3
p. 58-67
artikel
16
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi
2011
3
p. 182-187
artikel
17
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
Theodore Zahariadis
2010
3
p. 52-68
artikel
18
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment
K R Chandrasekhara Pillai
2010
3
p. 144-146
artikel
19
Enterprise Delegation for Service Based Systems
Coimbatore Chandersekaran
2011
3
p. 138-161
artikel
20
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK
Mohammad Saiful Islam Mamun
2010
3
p. 102-117
artikel
21
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
Mohamed Elboukhari
2010
3
p. 87-100
artikel
22
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
Mohamed Abid
2009
3
p. 01-13
artikel
23
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS
Pavaday Narainsamy
2010
3
p. 70-85
artikel
24
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
Asis Kumar Tripathy
2011
3
p. 98-109
artikel
25
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Chang N. Zhang
2010
3
p. 36-50
artikel
26
On Design of PUF-Based Random Number Generators
Mehdi Ayat
2011
3
p. 30-40
artikel
27
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Urjita Thakar
2010
3
p. 190-205
artikel
28
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
Moheb r. Girgis
2009
3
p. 63-73
artikel
29
PKI in Government Identity Management Systems
Ali M. Al-Khouri
2011
3
p. 69-96
artikel
30
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
Yasir Arfat Malkani
2009
3
p. 39-50
artikel
31
Securing AODV for MANETs using Message Digest with Secret Key
Mr. Kamaljit Lakhtaria
2009
3
p. 111-116
artikel
32
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
Jean-François Lalande
2009
3
p. 73-89
artikel
33
System Dynamics Based Insider Threats Modelin
Sang-Chin Yang
2011
3
p. 1-14
artikel
34
Transformation from Identity Stone Age to Digital Identity
Mohit Kohli
2011
3
p. 121-136
artikel
35
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
Ahmed M. Abd El-Haleem
2011
3
p. 189-204
artikel
36
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
Reza Amirpoor
2010
3
p. 158-167
artikel
36 gevonden resultaten
Koninklijke Bibliotheek -
Nationale Bibliotheek van Nederland