Search

Your search keyword '"COMPUTER security research"' showing total 157 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security research" Remove constraint Descriptor: "COMPUTER security research" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
157 results on '"COMPUTER security research"'

Search Results

1. Engineering Trustworthy Systems: A Principled Approach to Cybersecurity.

2. Byzantine Agreement in Expected Polynomial Time.

3. Constant-Round Nonmalleable Commitments from Any One-Way Function.

4. Keystroke dynamics on Android platform.

5. Assessing the Security Posture of Cloud Service Providers.

6. Wireless Network Security recommendations Using the Application for Security Evaluation.

7. An approach of security testing for third-party component based on state mutation.

8. A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.

9. Information Interoperability System Using Multi-agent with Security.

10. A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.

11. Information Security Evaluation Using Multi-Attribute Threat Index.

12. SecureDom: secure mobile-sensitive information protection with domain separation.

13. A secure cloud storage system combining time-based one-time password and automatic blocker protocol.

14. Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.

15. On Acceleration and Scalability of Number Theoretic Private Information Retrieval.

16. HEAP: Reliable Assessment of BGP Hijacking Attacks.

17. Quantum Private Query Protocol Based on Two Non-Orthogonal States.

18. SECURITY MEASURES FOR OPEN SOURCE WEBSITE PLATFORMS.

19. A GPU implementation of secret sharing scheme based on cellular automata.

20. An enhanced security framework for reliable Android operating system.

21. Introducing touchstroke: keystroke-based authentication system for smartphones.

22. Small target detection using morphology and modified Gaussian distance function.

23. Single authentication through in convergence space using collaborative smart cameras.

24. Optimisation-based collaborative determination of component trustworthiness in service compositions.

25. A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages.

26. Server-based code obfuscation scheme for APK tamper detection.

27. Secure and efficient data access control in cloud computing environment: A survey.

28. A survey of accountability in computer networks and distributed systems.

29. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits.

30. Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules.

31. Demographic variables and risk factors in computer-crime: an empirical assessment.

32. Factors affecting the continuous use of cloud service: focused on security risks.

33. Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation.

34. Selectively chosen ciphertext security in threshold public-key encryption.

35. Efficient and secure multi-functional searchable symmetric encryption schemes.

36. Cryptanalysis of a robust key agreement based on public key authentication.

37. A secure, service priority-based incentive scheme for delay tolerant networks.

38. Securing software defined wireless networks.

39. Prediction Using Propagation: From Flu Trends to Cybersecurity.

40. Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?

41. Noise protected 1-of-4 coding system with active zero for computing systems.

42. A comprehensive fault-tolerant framework for wireless sensor networks.

43. Signcryption KEM/tag-KEM, revisited.

44. On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.

45. A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.

46. BAFi: a practical cryptographic secure audit logging scheme for digital forensics.

47. An efficient and tunable matrix-disguising method toward privacy-preserving computation.

48. Group authenticated key exchange schemes via learning with errors.

49. Modeling and verification of trust and reputation systems.

50. Enhanced security and reliability with MIMO communications for smart grid.

Catalog

Books, media, physical & digital resources