Results
1 to 10 of 304

Analyzing and Developing Role-Based Access Control Models

Version: Accepted
Status: Live|Last updated:February 15, 2017 4:29 PM
zero star rating average
0 comments

The sizes of consecutive repeat-free codes

Version: Published
Status: Live|Last updated:February 15, 2017 4:01 PM
zero star rating average
0 comments

On Plaintext-Aware Public-Key Encryption Schemes

Version: Published
Status: Live|Last updated:February 15, 2017 4:00 PM
zero star rating average
0 comments

Analyzing and Developing Role-Based Access Control Models

Version: Approved
Status: Live|Last updated:February 15, 2017 2:27 PM
zero star rating average
0 comments

Forensic Tracking and Surveillance

Version: Approved
Status: Live|Last updated:February 10, 2017 10:21 AM
zero star rating average
0 comments

Topology-Aware Vulnerability Mitigation Worms

Version: Approved
Status: Live|Last updated:February 9, 2017 5:25 PM
zero star rating average
0 comments

Preemptive mobile code protection using spy agents

Version: Approved
Status: Live|Last updated:February 9, 2017 5:22 PM
zero star rating average
0 comments

Some Results in Group-Based Cryptography

Version: Approved
Status: Live|Last updated:February 9, 2017 5:17 PM
zero star rating average
0 comments

Wide-Sense Fingerprinting Codes and Honeycomb Arrays

Version: Approved
Status: Live|Last updated:February 9, 2017 5:16 PM
zero star rating average
0 comments

Modeling natural microimage statistics

Version: Submitted
Status: Live|Last updated:February 7, 2017 11:31 AM
zero star rating average
0 comments