


default search action
Transactions on Computational Science, Volume 11, 2010
- Marina L. Gavrilova, Chih Jeng Kenneth Tan, Edward D. Moreno:

Transactions on Computational Science XI - Special Issue on Security in Computing, Part II. Lecture Notes in Computer Science 6480, Springer 2010, ISBN 978-3-642-17696-8 - Celia Li, Zhuang Wang, Cungang Yang:

SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks. 1-16 - Sven Lachmund, Gregor Hengst:

Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. 17-38 - Frederik Armknecht

, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti
, Christian Wachsmann:
Impossibility Results for RFID Privacy Notions. 39-63 - Ricardo José Menezes Maia, Paulo Sérgio Licciardi Messeder Barreto, Bruno Trevizan de Oliveira:

Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network. 64-78 - Vladimir Trujillo-Olaya

, Jaime Velasco-Medina
:
Hardware Architectures for Elliptic Curve Cryptoprocessors Using Polynomial and Gaussian Normal Basis over GF(2233). 79-103 - Owen Harrison, John Waldron:

GPU Accelerated Cryptography as an OS Service. 104-130 - Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard:

From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems. 131-161 - Fábio Dacêncio Pereira, Edward D. Moreno:

Performance Issues on Integration of Security Services. 162-178 - André Proto, Leandro A. Alexandre, Maira L. Batista, Isabela L. Oliveira, Adriano M. Cansian:

Statistical Model Applied to NetFlow for Network Intrusion Detection. 179-191 - Feng Hao

, Peter Y. A. Ryan
:
J-PAKE: Authenticated Key Exchange without PKI. 192-206 - P. T. V. Bhuvaneswari, Vijay Vaidehi, M. Agnes Saranya:

Distance Based Transmission Power Control Scheme for Indoor Wireless Sensor Network. 207-222 - Paul Raymond Nicholl, Afandi Ahmad

, Abbes Amira:
A Novel Feature Vectors Construction Approach for Face Recognition. 223-248 - Heidar Pirzadeh, Danny Dubé, Abdelwahab Hamou-Lhadj

:
An Extended Proof-Carrying Code Framework for Security Enforcement. 249-269 - Sarabjeet Singh Bedi, Shekhar Verma

, Geetam S. Tomar
:
NPT Based Video Watermarking with Non-overlapping Block Matching. 270-292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














