Search

Your search keyword '"COMPUTER security research"' showing total 620 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security research" Remove constraint Descriptor: "COMPUTER security research"
620 results on '"COMPUTER security research"'

Search Results

201. Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems.

202. Modern methods of computer steganography systematization.

203. Analysis of «incident» definitions and its interpretation in cyberspace.

204. Forcing Johnny to login safely.

205. A study on abnormal event correlation analysis for convergence security monitor.

206. NMIBAS: A NOVEL MULTI-RECEIVER ID-BASED ANONYMOUS SIGNCRYPTION WITH DECRYPTION FAIRNESS.

207. Database Fortification using Demand Data Enciphering.

208. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance.

209. Research on a security mechanism for cloud computing based on virtualization.

210. VoxGrid: a mobile voice verification system.

211. SOUL System: secure online USB login system.

212. Cyber insecurity as a national threat: overreaction from Germany, France and the UK?

213. Interactions of Young Andalusian People inside Social Networks.

214. Psychosocial risksCan their effects on the security of information systems really be ignored?

215. Testing a Model of Users' Web Risk Information Seeking Intention.

216. Implementation of Physical Layer Key Distribution using Software Defined Radios.

217. Applying Protection Motivation Theory to Information Security Training for College Students.

218. A security-enhanced key agreement protocol based on chaotic maps.

219. Hacking Heats Up.

220. WEB THREAT AND ITS IMPLICATION FOR E-BUSINESS IN NIGERIA.

221. The Dark Side of Online Knowledge Sharing.

222. Perfect secrecy systems immune to spoofing attacks.

223. Insider threat mitigation: preventing unauthorized knowledge acquisition.

224. Cyber security, building automation, and the intelligent building.

225. BIZTONSÁGI KONTROLL MEGVALÓSÍTÁSA BIZTONSÁGTECHNIKAI MEGOLDÁSSAL.

226. Dynamics of a Delay-Varying Computer Virus Propagation Model.

227. Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards.

228. Cyberphysical systems security applied to telesurgical robotics

229. Research and Design a Security Neighbor Discovery Protocol.

230. Solving identity delegation problem in the e-government environment.

231. Electronic retention: what does your mobile phone reveal about you?

232. Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.

233. Token-based graphical password authentication.

234. AIS : A Computational Approach for Network Intrusion Detection System.

235. Word-Based LSB Image Steganography.

236. A Novel approach to Adaptively Secure Message Transmission in The Non-Erasure Model.

237. Analysis of RC6 Symmetric Encryption Algorithm.

238. SAS: semantics aware signature generation for polymorphic worm detection.

239. CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.

240. Enhancing host security using external environment sensors.

241. Security Evaluation of Passwords Used on Internet.

242. Cryptographically sound security proofs for basic and public-key Kerberos.

243. Probabilistic timing covert channels: to close or not to close?

244. COMPUTER SCIENCE SECURITY RESEARCH AND HUMAN SUBJECTS: EMERGING CONSIDERATIONS FOR RESEARCH ETHICS BOARDS.

245. CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT.

246. Web Authentication Protocol Using Zero Knowledge Proof.

247. A case study in hardware Trojan design and implementation.

248. Identity-based cryptography for grid security.

249. The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.

250. DEFENDING AGAINST BOTNETS.

Catalog

Books, media, physical & digital resources