Works matching IS 00104620 AND DT 2012 AND VI 55 AND IP 4
Results: 13
On F5 Steganography in Images.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 447, doi. 10.1093/comjnl/bxr092
- By:
- Publication type:
- Article
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
- Published in:
- 2012
- By:
- Publication type:
- Correction Notice
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 384, doi. 10.1093/comjnl/bxr089
- By:
- Publication type:
- Article
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 397, doi. 10.1093/comjnl/bxr084
- By:
- Publication type:
- Article
Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 487, doi. 10.1093/comjnl/bxr106
- By:
- Publication type:
- Article
Capsule Reviews.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 379, doi. 10.1093/comjnl/bxs034
- By:
- Publication type:
- Article
Efficient Revocable ID-Based Encryption with a Public Channel.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 475, doi. 10.1093/comjnl/bxr098
- By:
- Publication type:
- Article
Encrypted Pointers in Protection System Design.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 497, doi. 10.1093/comjnl/bxr107
- By:
- Publication type:
- Article
Advances in Network and System Security: Editorial Statement.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 382
- By:
- Publication type:
- Article
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 410
- By:
- Publication type:
- Article
Satisfying Privacy Requirements Before Data Anonymization.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 422, doi. 10.1093/comjnl/bxr028
- By:
- Publication type:
- Article
Improved Anonymous Multi-receiver Identity-Based Encryption.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 439, doi. 10.1093/comjnl/bxr086
- By:
- Publication type:
- Article
Certificateless Signatures: New Schemes and Security Models1.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 457, doi. 10.1093/comjnl/bxr097
- By:
- Publication type:
- Article