Search

Your search keyword '"Doug Tygar"' showing total 1,672 results

Search Constraints

Start Over You searched for: "Doug Tygar" Remove constraint "Doug Tygar" Topic computer science Remove constraint Topic: computer science
1,672 results on '"Doug Tygar"'

Search Results

1. A low-bandwidth camera sensor platform with applications in smart camera networks

3. Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values

4. Advances in Software Engineering Techniques

5. Panel: Authentication in Constrained Environments

6. Computer Security in the 21st Century

8. BAP: Broadcast Authentication Using Cryptographic Puzzles.

9. Panel: Authentication in Constrained Environments.

10. Rediscovering Distributed Systems.

11. RESEARCHERS USE SOUND TO DECIPHER KEYSTROKES.

12. Computer Science: Too Young to Fall into the Gender Gap.

13. Randomly Partitioned Encryption for Cloud Databases

14. Integrity Assurance for Outsourced Databases without DBMS Modification

15. Optimizing Integrity Checks for Join Queries in the Cloud

16. Mining Attribute-Based Access Control Policies from Logs

17. GreenBrowsing: Towards Energy Efficiency in Browsing Experience

18. Scalable and Accurate Causality Tracking for Eventually Consistent Stores

19. Making Operation-Based CRDTs Operation-Based

20. Progress as Compositional Lock-Freedom

21. Safe and Efficient Data Sharing for Message-Passing Concurrency

22. Coordination of ECA Rules by Verification and Control

23. Intelligent Method for Dipstick Urinalysis Using Smartphone Camera

24. An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources

25. Ball Distance Estimation and Tracking System of Humanoid Soccer Robot

26. Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters

27. Improving Reusability of OER

28. Self-generating Programs – Cascade of the Blocks

29. Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons

30. A Design of Web Log Integration Framework Using NoSQL

31. A Semantic-Based Malware Detection System Design Based on Channels

32. A Distributed Generic Data Structure for Urban Level Building Data Monitoring

33. A Robust Visual Object Tracking Approach on a Mobile Device

34. Creation of Assurance Case Using Collaboration Diagram

35. Attribute-Based Fine-Grained Access Control with User Revocation

36. LDFGB Algorithm for Anomaly Intrusion Detection

37. Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching

38. State Machine Abstraction Layer

39. Concern Based SaaS Application Architectural Design

40. On If-Then Multi Soft Sets-Based Decision Making

41. Requirements Identification for Migrating eGovernment Applications to the Cloud

42. Toward a Data-Driven Performance-Guided Urban Decision-Support Environment

43. Autonomous multi-dimensional slicing for large-scale distributed systems

44. Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images

45. A Self-organising Approach for Smart Meter Communication Systems

46. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme

47. Distributed Exact Deduplication for Primary Storage Infrastructures

48. Security Assessment of Computer Networks Based on Attack Graphs and Security Events

49. Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems

50. Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam

Catalog

Books, media, physical & digital resources