Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             15 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks Mohammed Mana
2011
3 2 p. 1-11
artikel
2 A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password Tanmay Bhattacharya
2011
3 2 p. 111-120
artikel
3 A QoS Based MAC Protocol For Wireless Ad-hoc Network Vandana khare
2011
3 2 p. 196-210
artikel
4 A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers Jaydip Sen
2011
3 2 p. 162-179
artikel
5 Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel Raju Singh
2011
3 2 p. 67-76
artikel
6 Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards Ashok Kumar Das
2011
3 2 p. 13-28
artikel
7 Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System Renuka Prasad.B
2011
3 2 p. 52-65
artikel
8 Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key Sabyasachi Samanta
2011
3 2 p. 30-41
artikel
9 Image Encryption Based On Diffusion And Multiple Chaotic Maps G.A.Sathishkumar
2011
3 2 p. 181-194
artikel
10 Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience C Singh
2011
3 2 p. 78-95
artikel
11 Replication Attack Mitigations for Static And Mobile WSN V.Manjula
2011
3 2 p. 122-133
artikel
12 Stage Staffing Scheme for Copyright Protection In Multimedia Sumit Kumar
2011
3 2 p. 135-147
artikel
13 Substitution-diffusion based Image Cipher Narendra K Pareek
2011
3 2 p. 149-160
artikel
14 The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations Harry Yosh
2011
3 2 p. 43-50
artikel
15 Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption Jaydeep Howlader
2011
3 2 p. 97-109
artikel
                             15 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland