Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing | 0 | 0.34 | 2005 |
Modeling And Performance Study Of Mpls Vpn | 0 | 0.34 | 2005 |
Securing the Enterprise Database | 0 | 0.34 | 2005 |
Design of Continuous Call Market with Assignment Constraints | 0 | 0.34 | 2005 |
ID-based Serial Multisignature Scheme using Bilinear Pairings | 0 | 0.34 | 2005 |
Auction Based System for Electronic Commerce Transaction | 0 | 0.34 | 2005 |
A framework for modeling automated negotiation | 0 | 0.34 | 2004 |
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks | 1 | 0.37 | 2004 |
Intelligent Information Technology, 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings | 43 | 2.80 | 2004 |
Frequency- and ordering-based similarity measure for host-based intrusion detection | 4 | 0.42 | 2004 |
MPLS Architecture for Service Provider | 0 | 0.34 | 2004 |
Security Analysis of Lal and Awasthi's Proxy Signature Schemes. | 3 | 0.55 | 2003 |
Reed Solomon Codes for Digital Fingerprinting | 0 | 0.34 | 2002 |