You are here

Search results

Searching as anonymous (not verified)

14 items found in collection [showing 1 - 14]
  • CSV Spreadsheet
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Trust Management in Mobile Wireless Networks
Trust Management in Mobile Wireless Networks
Legally Resilient Signatures
Legally Resilient Signatures
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Reuse of Personal Software Assets
Reuse of Personal Software Assets
Customizable Learning Objects Metadata Authoring
Customizable Learning Objects Metadata Authoring
On Lid Allocation and Assignment in Infiniband Networks
On Lid Allocation and Assignment in Infiniband Networks
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software          Systems
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software Systems
Secure Real-Time Conversations
Secure Real-Time Conversations
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Predator and Prey Alert System
Predator and Prey Alert System