42 results on '"Kotulski, Zbigniew"'
Search Results
2. On a New Intangible Reward for Card-Linked Loyalty Programs
3. New SDN-Oriented Authentication and Access Control Mechanism
4. Multi-level Stateful Firewall Mechanism for Software Defined Networks
5. Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions
6. Image Encryption Using Koblitz’s Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator
7. Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators
8. Context-Aware Secure Routing Protocol for Real-Time Services
9. A Virtualization-Level Future Internet Defense-in-Depth Architecture
10. Secure Position-Based Selecting Scheme for WSN Communication
11. Error Analysis with Applications in Engineering
12. SPOT: Optimization Tool for Network Adaptable Security
13. On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks
14. Random Variables and Probability; Normal Distribution
15. Probability Distributions and Their Characterizations
16. Two-dimensional Distributions
17. Two-dimensional Functions of Independent Random Variables
18. Basic Characteristics of Error Distribution; Histograms
19. Functions of Independent Random Variables
20. Useful Definitions and Facts of Probability Theory for Further Reading
21. Problems Described by Implicit Equations
22. Adaptive Approach to Network Security
23. Security of Mobile Code
24. Security of Mobile Code
25. Secure Routing with Reputation in MANET
26. New VoIP Traffic Security Scheme with Digital Watermarking
27. Mobile Agents: Preserving Privacy and Anonymity
28. On Application of Neural Networks for S-Boxes Design
29. Addressing New Challenges by Building Security Protocols Around Graphs
30. On automatic secret generation and sharing for Karin-Greene-Hellman scheme
31. New Experimental Results in Differential — Linear Cryptanalysis of Reduced Variants of DES
32. Covert Channel for Improving VoIP Security
33. Neural Network as a Programmable Block Cipher
34. Equations for the characteristic functional and moments of the complex stochastic evolutions — motivation and results
35. SPOT: Optimization Tool for Network Adaptable Security.
36. On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
37. Covert Channel for Improving VoIP Security.
38. Neural Network as a Programmable Block Cipher.
39. New VoIP Traffic Security Scheme with Digital Watermarking.
40. On Application of Neural Networks for S-Boxes Design.
41. Mobile Agents: Preserving Privacy and Anonymity.
42. Addressing New Challenges by Building Security Protocols Around Graphs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.