Timing to block scanning malwares by using combinatorics proliferation model
|
2008 |
Omote, Kazumasa |
Remote algorithmic complexity attacks against randomized hash tables
|
2008 |
Bar-Josef, Noa |
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
|
2008 |
|
Multi-sequence H.264/AVC rate control based on the linear model
|
2008 |
Pastuszak, Grzegorz |
Non parametric stochastic expectation maximization for data clustering
|
2008 |
|
Design of a password-based EAP method
|
2008 |
Manganaro, Andrea |
Multi-service networks : a new approach to end-to-end topology management
|
2008 |
Bosneag, Anne-Marie |
Bit and power allocation strategies for OFDM systems over time-varying channels
|
2008 |
Gao, Xiang |
Mobile applications to a pervasive world
|
2008 |
Oliveira Coelho, Hiata Anderson de |
A novel grid-based micropayment system for heterogeneous multi-party accounting
|
2008 |
Abdelkader, Manel |
Bidding agents that perpetrate auction fraud
|
2008 |
Trevathan, Jarrod |
Critical success factors of internet shopping : the case of Japan
|
2008 |
Atchariyachanvanich, Kanokwan |
Score equalization in SVM multimodal fusion for person recognition
|
2008 |
Ejarque, Pascual |
Reliable intersection computation within malicious environments
|
2008 |
Böttcher, Stefan |
Facial expression synthesis and analysis
|
2008 |
Wang, Hao |
Pragmatic computing : a semiotic perspective to web services
|
2008 |
Liu, Kecheng |
A platform for mobile service provisioning based on SOA-integration
|
2008 |
Decker, Michael |
Securing biometric templates where similarity is measured with set intersection
|
2008 |
Socek, Daniel |
Securing real-time sessions in an IMS-based architecture
|
2008 |
|
A security hardening language based on aspect-orientation
|
2008 |
Mourad, Azzam |