Search

Your search keyword '"Doug Tygar"' showing total 72 results

Search Constraints

Start Over You searched for: "Doug Tygar" Remove constraint "Doug Tygar" Language undetermined Remove constraint Language: undetermined
72 results on '"Doug Tygar"'

Search Results

1. A low-bandwidth camera sensor platform with applications in smart camera networks

3. Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values

5. Panel: Authentication in Constrained Environments

6. Computer Security in the 21st Century

7. Technological dimensions of privacy in Asia

8. A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System

9. The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy

10. A Self-organising Approach for Smart Meter Communication Systems

11. Using Model Driven Security Approaches in Web Application Development

12. Efficient Variant of Rainbow without Triangular Matrix Representation

13. An Algorithm to Analyze Non-injective S-Boxes

14. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme

15. Distributed Exact Deduplication for Primary Storage Infrastructures

16. Security Assessment of Computer Networks Based on Attack Graphs and Security Events

17. Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems

18. Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam

19. Towards Semantic Mashup Tools for Big Data Analysis

20. Modeling the Emergence of a New Language: Naming Game with Hybridization

21. M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet

22. Formal Aspects of Component Software

23. High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods

24. A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid

25. Aggregation of Network Protocol Data Near Its Source

26. An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling

27. Implementation of Efficient Operations over GF(232) Using Graphics Processing Units

28. Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy

29. Advanced Techniques for Computer Sharing and Management of Strategic Data

30. Efficient DVFS to Prevent Hard Faults for Many-Core Architectures

31. Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem

32. A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud

33. Adaptive and Scalable High Availability for Infrastructure Clouds

34. A Full Privacy-Preserving Scheme for Location-Based Services

35. Predicting Size of Forest Fire Using Hybrid Model

36. A Block Cipher Mode of Operation with Two Keys

37. Image Watermarking Using Psychovisual Threshold over the Edge

38. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

39. Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

40. Floffy: Designing an Outdoor Robot for Children

41. On Identifying Proper Security Mechanisms

42. Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch

43. TransWiki: Supporting Translation Teaching

44. Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge

45. Secure and Verifiable Outsourcing of Sequence Comparisons

46. Architecture of Network Environment for High-Risk Security Experimentation

47. Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

48. Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks

49. An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors

50. VMAR: Optimizing I/O Performance and Resource Utilization in the Cloud

Catalog

Books, media, physical & digital resources