8

Two-tier authentication for cluster and individual sets in mobile ad hoc networks

Year:
2007
Language:
english
File:
PDF, 741 KB
english, 2007
12

Curbing gambling activities on the internet

Year:
2004
Language:
english
File:
PDF, 235 KB
english, 2004
21

Smart card based secure password authentication scheme

Year:
1996
Language:
english
File:
PDF, 570 KB
english, 1996
22

A dynamic access control scheme based upon the knapsack problem

Year:
1993
Language:
english
File:
PDF, 843 KB
english, 1993
30

A displacement addressing method for letter-oriented keys

Year:
1999
Language:
english
File:
PDF, 146 KB
english, 1999
36

Direct construction of a secret in generalized group-oriented cryptography

Year:
2004
Language:
english
File:
PDF, 136 KB
english, 2004
37

Measures of retaining digital evidence to prosecute computer-based cyber-crimes

Year:
2007
Language:
english
File:
PDF, 193 KB
english, 2007
39

Internet forensics on the basis of evidence gathering with Peep attacks

Year:
2007
Language:
english
File:
PDF, 685 KB
english, 2007
41

Remote table-based log-in authentication upon geometric triangle

Year:
2004
Language:
english
File:
PDF, 202 KB
english, 2004
43

VQ Applications in Steganographic Data Hiding Upon Multimedia Images

Year:
2011
Language:
english
File:
PDF, 687 KB
english, 2011
47

Anonymous wireless authentication on a portable cellular mobile system

Year:
2004
Language:
english
File:
PDF, 714 KB
english, 2004