Works matching DE "COMPUTER security research"
Results: 210
Information Interoperability System Using Multi-agent with Security.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 819, doi. 10.1007/s11277-015-3113-8
- By:
- Publication type:
- Article
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- By:
- Publication type:
- Article
Information Security Evaluation Using Multi-Attribute Threat Index.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 913, doi. 10.1007/s11277-015-3140-5
- By:
- Publication type:
- Article
Improved Hash Functions for Cancelable Fingerprint Encryption Schemes.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 1, p. 643, doi. 10.1007/s11277-015-2654-1
- By:
- Publication type:
- Article
Cooperative Relaying Protocol for Improving Physical Layer Security in Wireless Decode-and-Forward Relaying Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 4, p. 3033, doi. 10.1007/s11277-015-2580-2
- By:
- Publication type:
- Article
Optimized Spread Spectrum Watermarking for Fading-Like Collusion Attack with Improved Detection Performance.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 3, p. 1737, doi. 10.1007/s11277-013-1132-x
- By:
- Publication type:
- Article
Interactions of Young Andalusian People inside Social Networks.
- Published in:
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- By:
- Publication type:
- Article
Interacciones de los jóvenes andaluces en las redes sociales.
- Published in:
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- By:
- Publication type:
- Article
A chaotic block encryption algorithm.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- By:
- Publication type:
- Article
Channel abstractions for network security.
- Published in:
- Mathematical Structures in Computer Science, 2010, v. 20, n. 1, p. 3, doi. 10.1017/S0960129509990247
- By:
- Publication type:
- Article
About RFWKIDEA16-8, RFWKIDEA16-4, RFWKIDEA16-2 &RFWKIDEA16-1 networks created on the basis of IDEA16-8 network.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- By:
- Publication type:
- Article
Fuzzy neural production network model for information security systems.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 231, doi. 10.18372/2225-5036.20.7548
- By:
- Publication type:
- Article
The detection method of identification terms for intrusion detection system.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 217, doi. 10.18372/2225-5036.20.7546
- By:
- Publication type:
- Article
Modern methods of computer steganography systematization.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 209, doi. 10.18372/2225-5036.19.5628
- By:
- Publication type:
- Article
Analysis of «incident» definitions and its interpretation in cyberspace.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 175, doi. 10.18372/2225-5036.19.5620
- By:
- Publication type:
- Article
Cyber Crime Prevention and Role of Libraries.
- Published in:
- International Journal of Information Dissemination & Technology, 2013, v. 3, n. 3, p. 222
- By:
- Publication type:
- Article
The Philippine Cybercrime Prevention Act of 2012: To Protect or Destroy?
- Published in:
- DLSU Business & Economics Review, 2014, v. 24, n. 1, p. 96
- By:
- Publication type:
- Article
Testing a Model of Users' Web Risk Information Seeking Intention.
- Published in:
- Informing Science, 2013, v. 16, p. 1
- By:
- Publication type:
- Article
Separate privilege virtual machine security model based on mutual trust.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2784, doi. 10.3969/j.issn.1001-3695.2013.09.056
- By:
- Publication type:
- Article
Wet-paper stego-coding based on cyclic-code.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2805, doi. 10.3969/j.issn.1001-3695.2013.09.062
- By:
- Publication type:
- Article
Research on trust model based on infinitely repeated games theory in P2P networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2802, doi. 10.3969/j.issn.1001-3695.2013.09.061
- By:
- Publication type:
- Article
Research on payload adaptive batch steganography.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2780, doi. 10.3969/j.issn.1001-3695.2013.09.055
- By:
- Publication type:
- Article
Probabilistic public-key cryptosystem based on Chebyshev.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2772, doi. 10.3969/j.issn.1001-3695.2013.09.053
- By:
- Publication type:
- Article
Research of quantitative network security assessment based on Bayesian-attack graphs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2763, doi. 10.3969/j.issn.1001-3695.2013.09.051
- By:
- Publication type:
- Article
Cloud computing key management scheme based on covert mapping combined public key.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2759, doi. 10.3969/j.issn.1001-3695.2013.09.050
- By:
- Publication type:
- Article
Cooperative method of key derivation for LTE systems based on radio interface and core network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2755, doi. 10.3969/j.issn.1001-3695.2013.09.049
- By:
- Publication type:
- Article
Research on privacy preservation mechanism for DaaS.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2565, doi. 10.3969/j.issn.1001-3695.2013.09.002
- By:
- Publication type:
- Article
SECURITY MEASURES FOR OPEN SOURCE WEBSITE PLATFORMS.
- Published in:
- Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM.
- Published in:
- Criminology, 2014, v. 52, n. 1, p. 33, doi. 10.1111/1745-9125.12028
- By:
- Publication type:
- Article
The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
- Published in:
- Journal of Homeland Security & Emergency Management, 2011, v. 8, n. 1, p. 1, doi. 10.2202/1547-7355.1577
- By:
- Publication type:
- Article
Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance.
- Published in:
- Journal of Sensor & Actuator Networks, 2013, v. 2, n. 2, p. 316, doi. 10.3390/jsan2020316
- By:
- Publication type:
- Article
Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing.
- Published in:
- Journal of Information Systems Education, 2013, v. 24, n. 1, p. 53
- By:
- Publication type:
- Article
Research on a security mechanism for cloud computing based on virtualization.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 1, p. 19, doi. 10.1007/s11235-013-9672-7
- By:
- Publication type:
- Article
A secure cloud storage system combining time-based one-time password and automatic blocker protocol.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0037-0
- By:
- Publication type:
- Article
Investigating the Viability of Multifactor Graphical Passwords for User Authentication.
- Published in:
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 1/2, p. 10, doi. 10.1080/19393555.2014.891274
- By:
- Publication type:
- Article
Web Authentication Protocol Using Zero Knowledge Proof.
- Published in:
- Information Security Journal: A Global Perspective, 2011, v. 20, n. 2, p. 112, doi. 10.1080/19393555.2011.560925
- By:
- Publication type:
- Article
From the Editor's Desk.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 163, doi. 10.1080/19393550802493659
- By:
- Publication type:
- Article
BioCryptography.
- Published in:
- Journal of Applied Security Research, 2010, v. 5, n. 3, p. 306, doi. 10.1080/19361610.2010.484833
- By:
- Publication type:
- Article
Cryptographic Properties of Bipermutive Cellular Automata Rules.
- Published in:
- Journal of Cellular Automata, 2014, v. 9, n. 5/6, p. 437
- By:
- Publication type:
- Article
Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?
- Published in:
- Information Systems Management, 2016, v. 33, n. 1, p. 30, doi. 10.1080/10580530.2015.1117868
- By:
- Publication type:
- Article
O analiză a fenomenului criminalității informatice. Prejudicii aduse de atacurile cibernetice.
- Published in:
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 47
- By:
- Publication type:
- Article
Wireless LAN Security Issues (II). Security Assurance.
- Published in:
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 37, doi. 10.19107/ijisc.2014.01.04
- By:
- Publication type:
- Article
Detectarea şi eliminarea phishing-ului.
- Published in:
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 59, doi. 10.19107/ijisc.2014.01.07
- By:
- Publication type:
- Article
Information Security Analyst Profile.
- Published in:
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 29, doi. 10.19107/ijisc.2014.01.03
- By:
- Publication type:
- Article
An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development.
- Published in:
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 17, doi. 10.19107/ijisc.2014.01.02
- By:
- Publication type:
- Article
Insider threat mitigation: preventing unauthorized knowledge acquisition.
- Published in:
- International Journal of Information Security, 2012, v. 11, n. 4, p. 269, doi. 10.1007/s10207-012-0165-6
- By:
- Publication type:
- Article
Perfect secrecy systems immune to spoofing attacks.
- Published in:
- International Journal of Information Security, 2012, v. 11, n. 4, p. 281, doi. 10.1007/s10207-012-0166-5
- By:
- Publication type:
- Article
Solving identity delegation problem in the e-government environment.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- By:
- Publication type:
- Article
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 387, doi. 10.1007/s10207-011-0145-2
- By:
- Publication type:
- Article
Electronic retention: what does your mobile phone reveal about you?
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 337, doi. 10.1007/s10207-011-0144-3
- By:
- Publication type:
- Article