1–47 of 47 hits
Sort by:
Sort by:
-
Multi-domain Direct Anonymous Attestation Scheme from Pairings
British Library Conference Proceedings | 2014| -
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
British Library Conference Proceedings | 2014| -
Rational Secure Two-party Computation in Social Cloud
British Library Conference Proceedings | 2014| -
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage
British Library Conference Proceedings | 2014| -
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features
British Library Conference Proceedings | 2014| -
Identity Based Threshold Ring Signature from Lattices
British Library Conference Proceedings | 2014| -
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
British Library Conference Proceedings | 2014| -
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
British Library Conference Proceedings | 2014| -
Extending OpenStack Access Control with Domain Trust
British Library Conference Proceedings | 2014| -
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS
British Library Conference Proceedings | 2014| -
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
British Library Conference Proceedings | 2014| -
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock
British Library Conference Proceedings | 2014| -
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification
British Library Conference Proceedings | 2014| -
Capturing Android Malware Behaviour Using System Flow Graph
British Library Conference Proceedings | 2014| -
Tighter Security Bound of MIBS Block Cipher against Differential Attack
British Library Conference Proceedings | 2014| -
A New Approach to Executable File Fragment Detection in Network Forensics
British Library Conference Proceedings | 2014| -
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks
British Library Conference Proceedings | 2014| -
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios
British Library Conference Proceedings | 2014| -
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework
British Library Conference Proceedings | 2014| -
Formal Verification of Finite State Transactional Security Policy
British Library Conference Proceedings | 2014| -
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy
British Library Conference Proceedings | 2014| -
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
British Library Conference Proceedings | 2014| -
Lightweight Universally Composable Adaptive Oblivious Transfer
British Library Conference Proceedings | 2014| -
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS
British Library Conference Proceedings | 2014| -
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
British Library Conference Proceedings | 2014| -
A New Multivariate Based Threshold Ring Signature Scheme
British Library Conference Proceedings | 2014| -
A Proposed Approach to Compound File Fragment Identification
British Library Conference Proceedings | 2014| -
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications
British Library Conference Proceedings | 2014| -
psOBJ: Defending against Traffic Analysis with pseudo-Objects
British Library Conference Proceedings | 2014| -
Hierarchical Solution for Access Control and Authentication in Software Defined Networks
British Library Conference Proceedings | 2014| -
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures
British Library Conference Proceedings | 2014| -
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks
British Library Conference Proceedings | 2014| -
A Dynamic Matching Secret Handshake Scheme without Random Oracles
British Library Conference Proceedings | 2014| -
A Secure Obfuscator for Encrypted Blind Signature Functionality
British Library Conference Proceedings | 2014| -
Security Analysis and Improvement of Femtocell Access Control
British Library Conference Proceedings | 2014| -
Exploiting the Hard-Wired Vulnerabilities of Newcast via Connectivity-Splitting Attack
British Library Conference Proceedings | 2014| -
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service
British Library Conference Proceedings | 2014|
- ««
- «
- 1
- »»
Hits per page
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.