Works matching DE "COMPUTER security research"


Results: 210
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14

    A chaotic block encryption algorithm.

    Published in:
    Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
    By:
    • WEI Feng
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    The Dark Side of Online Knowledge Sharing.

    Published in:
    Journal of Information Systems, 2012, v. 26, n. 2, p. 71, doi. 10.2308/isys-50244
    By:
    • Smith, Antoinette L.;
    • Baxter, Ryan J.;
    • Boss, Scott R.;
    • Hunton, James E.
    Publication type:
    Article
    30

    Detectarea şi eliminarea phishing-ului.

    Published in:
    International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 59, doi. 10.19107/ijisc.2014.01.07
    By:
    • PRIPAS, Marian-Iulian
    Publication type:
    Article
    31
    32
    33

    Information Security Analyst Profile.

    Published in:
    International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 29, doi. 10.19107/ijisc.2014.01.03
    By:
    • BARBU, Ionuţ-Daniel;
    • PASCARIU, Cristian
    Publication type:
    Article
    34
    35
    36
    37
    38
    39
    40

    Secure Congestion Control in MANET.

    Published in:
    International Journal of Computer Science & Management Studies, 2013, v. 13, n. 6, p. 15
    By:
    • Singh, Yudhvir;
    • Siwach, Vikas;
    • Aggarwal, Divya
    Publication type:
    Article
    41
    42
    43
    44
    45
    46
    47
    48

    Token-based graphical password authentication.

    Published in:
    International Journal of Information Security, 2011, v. 10, n. 6, p. 321, doi. 10.1007/s10207-011-0147-0
    By:
    • Gyorffy, John;
    • Tappenden, Andrew;
    • Miller, James
    Publication type:
    Article
    49
    50