Works matching DE "COMPUTER security software"
Results: 296
Research on Semantic Gap Problem of Virtual Machine.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5983, doi. 10.1007/s11277-017-4823-x
- By:
- Publication type:
- Article
A Hierarchical and Role Based Secure Routing Protocol for Mobile Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1067, doi. 10.1007/s11277-016-3379-5
- By:
- Publication type:
- Article
Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 3, p. 655, doi. 10.1007/s11277-011-0474-5
- By:
- Publication type:
- Article
A Composite Privacy Leakage Indicator.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 511, doi. 10.1007/s11277-011-0383-7
- By:
- Publication type:
- Article
Security Challenges in the IP-based Internet of Things.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 527, doi. 10.1007/s11277-011-0385-5
- By:
- Publication type:
- Article
Special Issue on 'Internet of Things and Future Applications'.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 4, p. 80, doi. 10.3390/computers8040080
- By:
- Publication type:
- Article
About RFWKIDEA16-8, RFWKIDEA16-4, RFWKIDEA16-2 &RFWKIDEA16-1 networks created on the basis of IDEA16-8 network.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- By:
- Publication type:
- Article
Cryptographic system of protection UAVs communication channels against illegal intrusion.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 248, doi. 10.18372/2225-5036.20.7551
- By:
- Publication type:
- Article
Synthesis of elementary transposition functions controlled by information.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 242, doi. 10.18372/2225-5036.20.7550
- By:
- Publication type:
- Article
Achieving robust message authentication in sensor networks: a public-key based approach.
- Published in:
- Wireless Networks (10220038), 2010, v. 16, n. 4, p. 999, doi. 10.1007/s11276-009-0184-z
- By:
- Publication type:
- Article
Evaluating MAPSec by marking attack graphs.
- Published in:
- Wireless Networks (10220038), 2009, v. 15, n. 8, p. 1042, doi. 10.1007/s11276-008-0101-x
- By:
- Publication type:
- Article
Reconfigurable Secure Video Codec Based on DWT and AES Processor.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2010, n. 9, p. 36
- By:
- Publication type:
- Article
Formalising theories of trust for authentication protocols.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 19, doi. 10.1007/s10796-007-9049-0
- By:
- Publication type:
- Article
A NEW FRAMEWORK FOR BIOMETRIC FACE RECOGNITION USING VISUAL CRYPTOGRAPY.
- Published in:
- Annals of DAAAM & Proceedings, 2012, v. 23, n. 1, p. 0163
- By:
- Publication type:
- Article
ENCRYPTION STRATEGIES IN DATABASES.
- Published in:
- Annals of DAAAM & Proceedings, 2010, p. 165
- By:
- Publication type:
- Article
IMPLEMENTING SELF-PROTECTION IN DISTRIBUTED GRID ENVIRONMENT.
- Published in:
- Scalable Computing: Practice & Experience, 2010, v. 11, n. 4, p. 373
- By:
- Publication type:
- Article
REWARDS PARTNER COLUMN.
- Published in:
- Oklahoma Dental Association Journal, 2012, v. 103, n. 5, p. 6
- By:
- Publication type:
- Article
POLICY STRATEGIES TO IMPROVE CYBERSECURITY.
- Published in:
- Connecticut Insurance Law Journal, 2023, v. 30, n. 1, p. 82
- By:
- Publication type:
- Article
Design of Optimal Elliptic Curve Cryptography by using Partial Parallel Shifting Multiplier with Parallel Complementary.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 5, p. 337
- By:
- Publication type:
- Article
HONEYPOT SYSTEM BASED ON SOFTWARE CONTAINERS.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- By:
- Publication type:
- Article
Applications Control.
- Published in:
- Internal Auditor, 2002, v. 59, n. 2, p. 23
- By:
- Publication type:
- Article
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 3, p. 650, doi. 10.1007/s11036-017-0975-x
- By:
- Publication type:
- Article
Monitoring Smartphones for Anomaly Detection.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 1, p. 92, doi. 10.1007/s11036-008-0113-x
- By:
- Publication type:
- Article
STATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION.
- Published in:
- Bulletin of the Transilvania University of Brasov, Series III: Mathematics, Informatics, Physics, 2011, v. 4, n. 53, p. 129
- By:
- Publication type:
- Article
Verifiable Diversity Ranking Search Over Encrypted Outsourced Data.
- Published in:
- Computers, Materials & Continua, 2018, v. 55, n. 1, p. 37, doi. 10.3970/cmc.2018.055.037
- By:
- Publication type:
- Article
A New Approach to Construct Secret Sharing Schemes Based on Field Extensions.
- Published in:
- European Journal of Pure & Applied Mathematics, 2018, v. 11, n. 2, p. 468, doi. 10.29020/nybg.ejpam.v11i2.3250
- By:
- Publication type:
- Article
ANALYSIS OF BIT-SPLIT LANGUAGES FOR PACKET SCANNING AND EXPERIMENTS WITH WILDCARD MATCHING.
- Published in:
- International Journal of Foundations of Computer Science, 2009, v. 20, n. 4, p. 597, doi. 10.1142/S0129054109006760
- By:
- Publication type:
- Article
Protecting Your Home Broadband Computer.
- Published in:
- Journal of Electronic Resources in Medical Libraries, 2006, v. 3, n. 4, p. 89, doi. 10.1300/J383v03n04_08
- By:
- Publication type:
- Article
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 80, doi. 10.1109/MIC.2015.3
- By:
- Publication type:
- Article
Symantec takes endpoint security to next level: Artificial intelligence and cloud capabilities set Symantec endpoint offering above its rivals.
- Published in:
- 2018
- By:
- Publication type:
- Product Review
Local banks are still far from sharing threat intelligence: Despite launching in December 2016, the Cyber Intelligence Sharing Platform is still a work in progress for many banks in Hong Kong.
- Published in:
- 2017
- By:
- Publication type:
- Product Review
Samsung Knox frames a security-best approach to the mobile era.
- Published in:
- 2017
- Publication type:
- Product Review
Is your endpoint defense good enough?
- Published in:
- ComputerWorld Hong Kong, 2017, p. 5
- By:
- Publication type:
- Article
Putting forensic analysis at the endpoint.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 38
- By:
- Publication type:
- Article
SECURITY TURNS SMART AND AGILE.
- Published in:
- ComputerWorld Hong Kong, 2014, p. 41
- By:
- Publication type:
- Article
McAfee: filtering out cybernasties.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 83
- By:
- Publication type:
- Article
What are the most overrated security technologies?
- Published in:
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 18
- By:
- Publication type:
- Article
2010: A Security Odyssey.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 48
- Publication type:
- Article
Framework of LSB, Adaptive Steganalysis with IQM and Stegnography of Digital Media.
- Published in:
- Computer Science & Telecommunications, 2010, v. 25, n. 2, p. 39
- By:
- Publication type:
- Article
Datenschutz versus Bestandsschutz in Sondersammlungen.
- Published in:
- Bibliothek Forschung und Praxis, 2006, v. 30, n. 2, p. 203, doi. 10.1515/BFUP.2006.203
- By:
- Publication type:
- Article
HYBRID APPROACHES IN CRYPTOGRAPHY.
- Published in:
- Journal of Modern Technology & Engineering, 2023, p. 233
- By:
- Publication type:
- Article
Estimating the Effect of Noises over an Efficient Image Steganography Algorithm Based on Intensity and Path Adaptation.
- Published in:
- International Journal of Recent Research Aspects, 2018, v. 5, n. 1, p. 6
- By:
- Publication type:
- Article
BlockMatch: A Fine-Grained Binary Code Similarity Detection Approach Using Contrastive Learning for Basic Block Matching.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 23, p. 12751, doi. 10.3390/app132312751
- By:
- Publication type:
- Article
Coalesce Techniques to Secure Web Applications and Databases against SQL Injection Attacks.
- Published in:
- Electronic Journal of Computer Science & Information Technology, 2011, v. 3, n. 1, p. 26
- By:
- Publication type:
- Article
Input Contract Testing of Graphical User Interfaces.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2016, v. 26, n. 2, p. 183, doi. 10.1142/S0218194016500091
- By:
- Publication type:
- Article
Efficient Identity-Based Generalized Ring Signcryption Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5553, doi. 10.3837/tiis.2016.12.022
- By:
- Publication type:
- Article
Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 2, p. 881, doi. 10.3837/tiis.2016.02.024
- By:
- Publication type:
- Article
Identity - Based Multiple Key Agreement Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 12, p. 2392, doi. 10.3837/tiis.2011.12.007
- By:
- Publication type:
- Article
The Analysis of Random Propagating Worms using Network Bandwidth.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 2, p. 191, doi. 10.3837/tiis.2010.04.007
- By:
- Publication type:
- Article