Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc NetworksA.A. Adas, A.A. AdasJournal of King Abdulaziz University. Engineering sciences, 2017-01, Vol.28 (1), p.31-46 [Peer Reviewed Journal]No full-text |
|
2 |
Material Type: Article
|
HexE -- Securing Audio Contents in Voice Chat using Puzzle and TimestampAadhitya, AarXiv.org, 2024-01Ithaca: Cornell University Library, arXiv.orgFull text available |
|
3 |
Material Type: Book
|
Networked Services and Applications - Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. ProceedingsAagesen, Finn Arve ; Knapskog, Svein Johan Knapskog, Svein Johan ; Aagesen, Finn ArveBerlin, Heidelberg: Springer Berlin Heidelberg 2010No full-text |
|
4 |
Material Type: Article
|
Quantum lower bounds for the collision and the element distinctness problemsAaronson, Scott ; Shi, YaoyunJournal of the ACM, 2004-07, Vol.51 (4), p.595-605 [Peer Reviewed Journal]New York: Association for Computing MachineryFull text available |
|
5 |
Material Type: Article
|
Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approachAashiq Banu, S ; Amirtharajan, RengarajanMultimedia tools and applications, 2020-10, Vol.79 (39-40), p.28807-28824 [Peer Reviewed Journal]New York: Springer USFull text available |
|
6 |
Material Type: Dissertation
|
Is the pen mightier than the electronic signature? : the Australian businesses' perspectiveAashish Srivastava2008No full-text |
|
7 |
Material Type: Article
|
Prudent engineering practice for cryptographic protocolsAbadi, M. ; Needham, R.IEEE transactions on software engineering, 1996-01, Vol.22 (1), p.6-15 [Peer Reviewed Journal]New York, NY: IEEEFull text available |
|
8 |
Material Type: Article
|
Analyzing security protocols with secrecy types and logic programsABADI, Martin ; BLANCHET, BrunoJournal of the ACM, 2005, Vol.52 (1), p.102-146 [Peer Reviewed Journal]New York, NY: Association for Computing MachineryFull text available |
|
9 |
Material Type: Conference Proceeding
|
Computer-assisted verification of a protocol for certified emailAbadi, Martín ; Blanchet, Bruno Cousot, RadhiaLecture notes in computer science, 2003, p.316-335 [Peer Reviewed Journal]Berlin, Heidelberg: Springer-VerlagFull text available |
|
10 |
Material Type: Book
|
Principles of Security and Trust: Third International Conference, POST 2014, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, ProceedingsAbadi, Martín ; Kremer, SteveBerlin, Heidelberg: Springer Berlin / Heidelberg 2014Full text available |