Search

Your search keyword '"COMPUTER security research"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security research" Remove constraint Descriptor: "COMPUTER security research" Journal application research of computers / jisuanji yingyong yanjiu Remove constraint Journal: application research of computers / jisuanji yingyong yanjiu
9 results on '"COMPUTER security research"'

Search Results

1. Separate privilege virtual machine security model based on mutual trust.

2. Research of quantitative network security assessment based on Bayesian-attack graphs.

3. Research on payload adaptive batch steganography.

4. Probabilistic public-key cryptosystem based on Chebyshev.

5. Cloud computing key management scheme based on covert mapping combined public key.

6. Cooperative method of key derivation for LTE systems based on radio interface and core network.

7. Research on privacy preservation mechanism for DaaS.

8. Wet-paper stego-coding based on cyclic-code.

9. Research on trust model based on infinitely repeated games theory in P2P networks.

Catalog

Books, media, physical & digital resources