Results
1 to 10 of 304

Analyzing and Developing Role-Based Access Control Models

Version: Accepted
Status: Live|Last updated:15 February 2017 16:29
zero star rating average
0 comments

The sizes of consecutive repeat-free codes

Version: Published
Status: Live|Last updated:15 February 2017 16:01
zero star rating average
0 comments

On Plaintext-Aware Public-Key Encryption Schemes

Version: Published
Status: Live|Last updated:15 February 2017 16:00
zero star rating average
0 comments

Analyzing and Developing Role-Based Access Control Models

Version: Approved
Status: Live|Last updated:15 February 2017 14:27
zero star rating average
0 comments

Forensic Tracking and Surveillance

Version: Approved
Status: Live|Last updated:10 February 2017 10:21
zero star rating average
0 comments

Topology-Aware Vulnerability Mitigation Worms

Version: Approved
Status: Live|Last updated:09 February 2017 17:25
zero star rating average
0 comments

Preemptive mobile code protection using spy agents

Version: Approved
Status: Live|Last updated:09 February 2017 17:22
zero star rating average
0 comments

Some Results in Group-Based Cryptography

Version: Approved
Status: Live|Last updated:09 February 2017 17:17
zero star rating average
0 comments

Wide-Sense Fingerprinting Codes and Honeycomb Arrays

Version: Approved
Status: Live|Last updated:09 February 2017 17:16
zero star rating average
0 comments

Modeling natural microimage statistics

Version: Submitted
Status: Live|Last updated:07 February 2017 11:31
zero star rating average
0 comments