Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 6571 results
Sort by: relevance publication year

Context-Aware IPv6 Address Hopping

BOOK CHAPTER published 2020 in Information and Communications Security

Authors: Matthias Marx | Monina Schwarz | Maximilian Blochberger | Frederik Wille | Hannes Federrath

An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments

BOOK CHAPTER published 2009 in Lecture Notes in Computer Science

Authors: Sheila Fallon | Paul Jacob | Yuansong Qiao | Liam Murphy

Using the (Open) Solaris Service Management Facility as a Building Block for System Security

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Christoph Schuba

How to Steal a Botnet and What Can Happen When You Do

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Richard A. Kemmerer

Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Xin-Jing Ge | Jian-Ming Zhu

An Image Sanitizing Scheme Using Digital Watermarking

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Masatoshi Noguchi | Manabu Inuma | Rie Shigetomi | Hideki Imai

Public Key Encryption without Random Oracle Made Truly Practical

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Puwen Wei | Xiaoyun Wang | Yuliang Zheng

A Cognitive Mechanism for Rate Adaptation in Wireless Networks

BOOK CHAPTER published 2009 in Modelling Autonomic Communications Environments

Authors: Luciano Chaves | Neumar Malheiros | Edmundo Madeira | Islene Garcia | Dzmitry Kliazovich

Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Tomas Olsson

Online/Offline Ring Signature Scheme

BOOK CHAPTER published 2009 in Information and Communications Security

Authors: Joseph K. Liu | Man Ho Au | Willy Susilo | Jianying Zhou

Signaling Traffic Optimization in UMTS IP Multimedia Subsystem

BOOK CHAPTER published 2004 in Lecture Notes in Computer Science

Authors: Igor Miladinovic | Klaus Umschaden

The Applicability of Self-Awareness for Network Management Operations

BOOK CHAPTER published 2009 in Modelling Autonomic Communications Environments

Authors: John Strassner | Sven van der Meer | James Won-Ki Hong

Seamless Mobility of Senders Transmitting Multi-user Sessions over Heterogeneous Networks

BOOK CHAPTER published 2009 in Lecture Notes in Computer Science

Authors: Luis Veloso | Eduardo Cerqueira | Paulo Mendes | Edmundo Monteiro

positive-intrinsic-negative field-effect transistor integrated receiver

BOOK CHAPTER published 2000 in Computer Science and Communications Dictionary

Authors: Martin H. Weik

A Multi-hop Aware Weighted Scheduling Mechanism for HSDPA and IEEE 802.11 Integrated Network

BOOK CHAPTER published 2010 in Lecture Notes in Computer Science

Authors: Jinglong Zhou | Anthony Lo | Jiazhen Hao | Ignas Niemegeers

Facial Emotion Recognition in Curvelet Domain

BOOK CHAPTER published 2011 in Communications in Computer and Information Science

Authors: Gyanendra K. Verma | Bhupesh Kumar Singh

Application of Improved Ant Colony Algorithm in Integrated Circuit Routing

PROCEEDINGS ARTICLE published December 2009 in 2009 International Conference on Computer and Communications Security

Authors: Han Liying | Tang Hongmei | Sun Zhijie | Zhang Cunshan | Zhao Hongdong

Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions

BOOK CHAPTER published 2011 in Information and Communications Security

Authors: Yusong Du | Fangguo Zhang

Data Mining Integrated with Domain Knowledge

BOOK CHAPTER published 2009 in Communications in Computer and Information Science

Authors: Anqiang Huang | Lingling Zhang | Zhengxiang Zhu | Yong Shi

Estimating the Distribution Parameter of Non-prolonging Random Dead Time Duration in Recurrent Semi-Synchronous Events Flow Through Maximum Likelihood

BOOK CHAPTER published 2024 in Lecture Notes in Computer Science

Authors: Anna Vetkina | Ludmila Nezhel’skaya