Search

Your search keyword '"C.2.0"' showing total 42 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0" Topic d.4.6 Remove constraint Topic: d.4.6
42 results on '"C.2.0"'

Search Results

1. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

2. Information Leakage from Optical Emanations

3. Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

4. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment

5. Secure Distribution of Protected Content in Information-Centric Networking

6. Optical TEMPEST

7. Effective Caching for the Secure Content Distribution in Information-Centric Networking

8. An Authentication Protocol for Future Sensor Networks

9. Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness

10. Security and Privacy of performing Data Analytics in the cloud - A three-way handshake of Technology, Policy, and Management

11. Graph Analytics for anomaly detection in homogeneous wireless networks - A Simulation Approach

12. WhatsApp security and role of metadata in preserving privacy

13. Security-related Research in Ubiquitous Computing -- Results of a Systematic Literature Review

14. Two factor authentication using EEG augmented passwords

15. A Survey on Honeypot Software and Data Analysis

16. Open Mobile API: Accessing the UICC on Android Devices

17. Security Evaluation for Mail Distribution Systems

18. Blind and robust images watermarking based on wavelet and edge insertion

19. Network Access Control Technology - Proposition to contain new security challenges

20. High-Speed Signature Matching in Network Interface Device using Bloom Filters

21. Side-channel attack on labeling CAPTCHAs

22. Service Cloaking and Authentication at Data Link Layer

23. Secure Fractal Image Coding

24. CANE: The Content Addressed Network Environment

25. On the Performance of Joint Fingerprint Embedding and Decryption Scheme

26. A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA

27. ODP channel objects that provide services transparently for distributing processing systems

28. Security Policy Specification Using a Graphical Approach

29. Information Leakage from Optical Emanations

30. Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic

31. Levels of Anonymity

32. Secure Distribution of Protected Content in Information-Centric Networking

33. Effective Caching for the Secure Content Distribution in Information-Centric Networking

34. Security and Privacy of Performing Data Analytics in the Cloud: A Three-way Handshake of Technology, Policy, and Management

35. An Authentication Protocol for Future Sensor Networks

36. WhatsApp security and role of metadata in preserving privacy

37. Security-related Research in Ubiquitous Computing -- Results of a Systematic Literature Review

38. Blind and robust images watermarking based on wavelet and edge insertion

39. Two Factor Authentication using EEG Augmented Passwords

40. Index Structures for Data Warehouses

41. Access Control Management in Distributed Object Systems

42. On sigma-Filtered Boolean Algebras

Catalog

Books, media, physical & digital resources