You are here

Search results

Searching as anonymous (not verified)

15 items found in collection [showing 1 - 15]
  • CSV Spreadsheet
Enhanced Security for Mobile Agent Systems
Enhanced Security for Mobile Agent Systems
Legally Resilient Signatures
Legally Resilient Signatures
Modernized Version of Visual Cryptography
Modernized Version of Visual Cryptography
Case-Based Framework for Meta Intrusion Detection
Case-Based Framework for Meta Intrusion Detection
Iscsi-Based Storage Area Networks for Disaster Recovery Operations
Iscsi-Based Storage Area Networks for Disaster Recovery Operations
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Multiagent Dynamic Reasoning About Belief and Trust
Multiagent Dynamic Reasoning About Belief and Trust
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software          Systems
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software Systems
Metrics and Techniques to Guide Software Development
Metrics and Techniques to Guide Software Development
Topology Aggregation for Networks with Two Additive Metrics
Topology Aggregation for Networks with Two Additive Metrics
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Predator and Prey Alert System
Predator and Prey Alert System
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Crossing Reduction for Layered Hierarchical Graph Drawing
Crossing Reduction for Layered Hierarchical Graph Drawing