1–20 of 72 hits

Sort by: Relevancy | Date newest | Title A-Z

  1.  

    USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS

    Pimenta, F. / Serrao, C. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  2.  

    AN ALGORITHM FOR AUTHENTICATION OF DIGITAL IMAGES

    Burdescu, D. D. / Stanescu, L. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  3.  

    AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATION

    Toyoizumi, H. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  4.  

    PROTOCOL INDEPENDENT LIGHTWEIGHT SECURE COMMUNICATION

    Guvensan, M. A. / Yavuz, A. G. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  5.  

    QUANTITATIVE ANALYSIS AND ENFORCEMENT OF THE PRINCIPLE OF LEAST PRIVILEGE IN ROLE-BASED

    Lai, C. / Zhang, C. N. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  6.  

    PERSON VERIFICATION BY FUSION OF PROSODIC, VOICE SPECTRAL AND FACIAL PARAMETERS

    Hernando, J. / Farrus, M. / Ejarque, P. et al. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  7.  

    SECURE INFORMATION SYSTEMS DEVELOPMENT - Based on a Security Requirements Engineering Process

    Mellado, D. / Fernandez-Medina, E. / Piattini, M. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  8.  

    IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH

    Gan, Z. / Wei, D. / Varadharajan, V. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  9.  

    FLEXIBLE LICENSE TRANSFER SYSTEM USING MOBILE TERMINAL

    Inamura, M. / Tanaka, T. / Fujisawa, T. et al. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  10.  

    INTER-NODE RELATIONSHIP LABELING: A FINE-GRAINED XML ACCESS CONTROL IMPLEMENTATION USING GENERIC SECURITY LABELS

    Zhang, Z. / Rjaibi, W. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  11.  

    LEAST PRIVILEGE IN SEPARATION KERNELS

    Levin, T. E. / Irvine, C. E. / Nguyen, T. D. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  12.  

    DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES

    Zarza, L. / Pegueroles, J. / Soriano, M. et al. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  13.  

    LAYERED ARCHITECTURE FOR SECURE E-COMMERCE APPLICATIONS

    Herzberg, A. / Yoffe, I. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  14.  

    SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)

    Haaland, K. A. / Rong, C. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  15.  

    PRIVATE BIDDING FOR MOBILE AGENTS

    Gedrojc, B. / Cartrysse, K. / van der Lubbe, J. C.A. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  16.  

    TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS

    Jin, H. / Lotspiech, J. / Blaum, M. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  17.  

    A DOS ATTACK AGAINST THE INTEGRITY-LESS ESP (IPSEC)

    Nikov, V. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  18.  

    A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS

    Leung, A. / Mitchell, C. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  19.  

    ON THE DESIGN OF A LOW-RATE DOS ATTACK AGAINST ITERATIVE SERVERS

    Macia-Fernandez, G. / Diaz-Verdejo, J. E. / Garcia-Teodoro, P. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT
  20.  

    INTRUSION DETECTION FOR WEB APPLICATIONS (SHORT VERSION)

    Dagorn, N. | British Library Conference Proceedings | 2006
    Keywords: SECRYPT

Number of results: 10 | 20 | 50

Feedback