Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             8 results found
no title author magazine year volume issue page(s) type
1 Advanced Security Management in Metro Ethernet Networks Ammar Rayes
2010
2 1 p. 65-80
article
2 A Frame Work for Ontological Privacy Preserved Mining Geetha Mary. A
2010
2 1 p. 09-20
article
3 COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION Syed S. Rizvi
2010
2 1 p. 82-96
article
4 DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS James Cannady
2010
2 1 p. 01-07
article
5 PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES Wassim Itani
2010
2 1 p. 98-115
article
6 STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA Natarajan Meghanathan
2010
2 1 p. 43-55
article
7 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamdi
2010
2 1 p. 57-63
article
8 WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS Yan Luo
2010
2 1 p. 22-41
article
                             8 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands