Works matching IS 00104620 AND DT 2011 AND VI 54 AND IP 10
Results: 14
Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1661, doi. 10.1093/comjnl/bxr078
- By:
- Publication type:
- Article
Refinements of Miller's Algorithm over Weierstrass Curves Revisited.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1582
- By:
- Publication type:
- Article
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1645
- By:
- Publication type:
- Article
Surveying Port Scans and Their Detection Methodologies.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1565, doi. 10.1093/comjnl/bxr035
- By:
- Publication type:
- Article
CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1721, doi. 10.1093/comjnl/bxr087
- By:
- Publication type:
- Article
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1675, doi. 10.1093/comjnl/bxr080
- By:
- Publication type:
- Article
Fully Deniable Message Authentication Protocols Preserving Confidentiality.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1688, doi. 10.1093/comjnl/bxr081
- By:
- Publication type:
- Article
Capsule Reviews.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1561, doi. 10.1093/comjnl/bxr101
- By:
- Publication type:
- Article
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1632
- By:
- Publication type:
- Article
On the Hardness of the Sum of k Mins Problem.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1652, doi. 10.1093/comjnl/bxr070
- By:
- Publication type:
- Article
Compositional Approach to Quantify the Vulnerability of Computer Systems.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1616, doi. 10.1093/comjnl/bxr060
- By:
- Publication type:
- Article
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1603, doi. 10.1093/comjnl/bxr055
- By:
- Publication type:
- Article
A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1592, doi. 10.1093/comjnl/bxr041
- By:
- Publication type:
- Article
The Microcosmic Model of Worm Propagation.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1700, doi. 10.1093/comjnl/bxr082
- By:
- Publication type:
- Article