Your selections:
A 3D object encryption scheme which maintains dimensional and spatial stability
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
A new procedure to help system/network administrators identify multiple rootkit infections
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A Root-finding algorithm for list decoding of Reed-Muller codes
- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
Establishing reasoning communities of security experts for Internet Commerce Security
- Kelarev, Andrei, Brown, Simon, Watters, Paul, Wu, Xinwen, Dazeley, Richard
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Lower bound on minimum lee distance of algebraic-geometric codes over finite fields
- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli
New traceability codes and identification algorithm for tracing pirates
- Wu, Xinwen, Watters, Paul, Yearwood, John
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
RBACS : Rootkit behavioral analysis and classification system
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Are you sure you would like to clear your session, including search history and login status?