895 results on '"Virgil D"'
Search Results
52. An Advanced Model for MicroGrid and Energy Independence.
53. Network fault localization with small TCB.
54. A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
55. Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion)
56. Manifestations of environmental principles in bridging scientific context, reasoning and behaviour: framework in the development of environmental education programmes in the Philippines
57. Dependable connection setup for network capabilities.
58. Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion).
59. TrustVisor: Efficient TCB Reduction and Attestation.
60. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks.
61. Toward k-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links.
62. k-Connectivity in Random Key Graphs With Unreliable Links.
63. Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation.
64. Network Adversary Attacks against Secure Encryption Schemes.
65. Privacy-Preserving Relationship Path Discovery in Social Networks.
66. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks.
67. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
68. Efficient Handling of Adversary Attacks in Aggregation Applications.
69. Surviving Insider Attacks: A Call for System Experiments.
70. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
71. MiniSec: a secure sensor network communication architecture.
72. Towards a secure and interoperable DRM architecture.
73. Panel: Authentication in Constrained Environments.
74. Two-Server Password-Only Authenticated Key Exchange.
75. On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).
76. Distributed Detection of Node Replication Attacks in Sensor Networks.
77. Administering Access Control in Dynamic Coalitions.
78. Guaranteeing Access in Spite of Distributed Service-Flooding Attacks : (Transcript of Discussion)
79. A Model for Access Negotiations in Dynamic Coalitions.
80. Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion).
81. On Trust Establishment in Mobile Ad-Hoc Networks
82. Bootstrapping security associations for routing in mobile ad-hoc networks.
83. Weak Key Authenticity and the Computational Completeness of Formal Encryption.
84. Reasoning about Joint Administration of Access Policies for Coalition Resources.
85. A key-management scheme for distributed sensor networks.
86. Negotiation of Access Control Policies : (Transcript of Discussion)
87. On the Negotiation of Access Control Policies
88. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
89. A New Privacy-Enhanced Matchmaking Protocol.
90. Review and Revocation of Access Privileges Distributed with PKI Certificates : Transcript of Discussion
91. Review and Revocation of Access Privileges Distributed with PKI Certificates
92. Two-server password-only authenticated key exchange.
93. Denial of Service - Panel Discussion.
94. SubDomain: Parsimonious Server Security.
95. Integrity-Aware PCBC Encryption Schemes
96. Indications for an antidepressive effect of thymosin alpha-1 in a small open-label proof of concept study in common variable immune deficiency patients with depression
97. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents
98. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion)
99. Application-Oriented Security Policies and Their Composition : Position Paper
100. Secure wireless networking.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.