1

Secure encrypted-data aggregation for wireless sensor networks

Year:
2010
Language:
english
File:
PDF, 559 KB
english, 2010
2

The security of machine learning

Year:
2010
Language:
english
File:
PDF, 701 KB
english, 2010
4

Adversarial Machine Learning

Year:
2011
Language:
english
File:
PDF, 458 KB
english, 2011
11

Computer Security in the 21st Century || Challenges in Protocol Design and Analysis

Year:
2005
Language:
english
File:
PDF, 860 KB
english, 2005
12

OSNP: Secure wireless authentication protocol using one-time key

Year:
2009
Language:
english
File:
PDF, 573 KB
english, 2009
13

Optimal sampling strategies for quicksort

Year:
1995
Language:
english
File:
PDF, 732 KB
english, 1995
14

Computability and complexity of ray tracing

Year:
1994
Language:
english
File:
PDF, 1.12 MB
english, 1994
15

SPINS: Security Protocols for Sensor Networks

Year:
2002
Language:
english
File:
PDF, 184 KB
english, 2002
17

A model for secure protocols and their compositions

Year:
1996
Language:
english
File:
PDF, 1.93 MB
english, 1996
18

Miro: visual specification of security

Year:
1990
Language:
english
File:
PDF, 1.36 MB
english, 1990
19

Efficient Parallel Pseudorandom Number Generation

Year:
1988
Language:
english
File:
PDF, 1.05 MB
english, 1988
24

Technological dimensions of privacy in Asia

Year:
2003
Language:
english
File:
PDF, 435 KB
english, 2003
32

NetBill: an Internet commerce system optimized for network-delivered services

Year:
1995
Language:
english
File:
PDF, 809 KB
english, 1995
36

Computer Security in the 21st Century ||

Year:
2005
Language:
english
File:
PDF, 13.44 MB
english, 2005
42

Keyboard acoustic emanations revisited

Year:
2009
Language:
english
File:
PDF, 514 KB
english, 2009
50

Computer Security in the 21st Century || A Source-End Defense System Against DDoS Attacks

Year:
2005
Language:
english
File:
PDF, 1.17 MB
english, 2005