A Low Device Occupation IP to Implement Rijndael Algorithm
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07 Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6
Optimizing security in e-commerce through implementation of hybird tecnologies
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
DVB Service Security--A Problem in Development of Multi-service Television
EUROITV '08 Proceedings of the 6th European conference on Changing Television Environments
A programmable network address translator: Design, implementation, and performance
ACM Transactions on Internet Technology (TOIT)
Anonymous Transactions in Computer Networks
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Security analysis and design of a uniform identity authentication system
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform
Journal of Signal Processing Systems
On the (in)security of IPsec in MAC-then-encrypt configurations
Proceedings of the 17th ACM conference on Computer and communications security
PSIAQOP: preventing SQL injection attacks based on query optimization process
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
Anonymous transactions in computer networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Hi-index | 0.00 |