Search

Showing total 3,664 results

Search Constraints

Start Over You searched for: Topic computer communication networks Remove constraint Topic: computer communication networks Topic management of computing and information systems Remove constraint Topic: management of computing and information systems Publisher springer nature Remove constraint Publisher: springer nature
3,664 results

Search Results

1. Efficient Wet Paper Codes.

2. Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).

3. Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks.

4. Practical Security Analysis of Dirty Paper Trellis Watermarking.

5. What Are the Future Possibilities of eDemocracy? A Discussion Paper.

6. e-Gov Research Quality Improvements Since 2003: More Rigor, but Research (Perhaps) Redefined.

7. On the Use of Different Statistical Tests for Alert Correlation - Short Paper.

8. From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust.

9. A Fair Anonymous Submission and Review System.

10. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.

11. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.

12. Using Packet Combination in Multi-query Optimization for Data Collection in Sensor Networks.

13. Action in Action Research - Illustrations of What, Who, Why, Where, and When from an E-Government Project.

14. Model-Based Testing of Optimizing Compilers.

15. Informed Recognition in Software Watermarking.

16. Electronic Voting in Belgium: Past and Future.

17. The Development of Remote E-Voting Around the World: A Review of Roads and Directions.

18. Authenticated Key Exchange and Key Encapsulation in the Standard Model.

19. Acceptance of Voting Technology: Between Confidence and Trust.

20. A Study of Detection Method of Printed Image Alteration Using Digital Watermark.

21. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.

22. Exploiting Security Holes in Lattice Data Hiding.

23. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.

24. Experimental Testing of TCP/IP/Ethernet Communication for Automatic Control.

25. A Study of Developing Virtual Prototyping by Using JavaBean Interface Tool and SystemC Engine.

26. Experimental Analysis on Time-Triggered Power Consumption Measurement with DVS-Enabled Multiple Power Domain Platform.

27. Ontology Based Context Alignment for Heterogeneous Context Aware Services.

28. Offloading IP Flows onto Lambda-Connections.

29. PRESENT: An Ultra-Lightweight Block Cipher.

30. Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor.

31. Description of a Naming Architecture Managing Cryptographic Identifiers.

32. Securing the Wireless LANs Against Internal Attacks.

33. Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.

34. An Energy Efficient Communication Protocol Based on Data Equilibrium in Mobile Wireless Sensor Network.

35. Modeling the Effect of Forwarding in a Multi-hop Ad Hoc Networks with Weighted Fair Queueing.

36. Research on Hidden Markov Model for System Call Anomaly Detection.

37. The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare.

38. How to Overcome Main Obstacles to Building a Virtual Telematics Center.

39. New Results on Impossible Differential Cryptanalysis of Reduced AES.

40. Reaching Communication Quality in Public E-Forms - A Communicative Perspective on E-Form Design.

41. The E-Government Melting Pot: Lacking New Public Management and Innovation Flavor?

42. An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).

43. Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits.

44. Security Requirements Model for Grid Data Management Systems.

45. Minimal Threshold Closure.

46. Discriminant Analysis Based on Kernelized Decision Boundary for Face Recognition.

47. Modelling the Time-Variant Covariates for Gait Recognition.

48. Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.

49. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.

50. Secret Signatures: How to Achieve Business Privacy Efficiently?