1–20 of 78 hits
Sort by:
Sort by:
-
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields
British Library Conference Proceedings | 2011| -
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network
British Library Conference Proceedings | 2011| -
An Approach for Adapting Moodle into a Secure Infrastructure
British Library Conference Proceedings | 2011| -
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP
British Library Conference Proceedings | 2011| -
A New Alert Correlation Algorithm Based on Attack Graph
British Library Conference Proceedings | 2011| -
A New Particle Swarm Optimization for Dynamic Environments
British Library Conference Proceedings | 2011| -
A Quantitative Analysis into the Economics of Correcting Software Bugs
British Library Conference Proceedings | 2011| -
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps
British Library Conference Proceedings | 2011| -
A Classifier Ensemble for Face Recognition Using Gabor Wavelet Features
British Library Conference Proceedings | 2011| -
An Innovative Linkage Learning Based on Differences in Local Optimums
British Library Conference Proceedings | 2011| -
An Innovative Framework for Securing Unstructured Documents
British Library Conference Proceedings | 2011| -
Structural Feature Based Anomaly Detection for Packed Executable Identification
British Library Conference Proceedings | 2011| -
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification
British Library Conference Proceedings | 2011| -
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures
British Library Conference Proceedings | 2011| -
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems
British Library Conference Proceedings | 2011| -
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls
British Library Conference Proceedings | 2011|
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.