Your selections:
Lower bound on minimum lee distance of algebraic-geometric codes over finite fields
- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli
New traceability codes and identification algorithm for tracing pirates
- Wu, Xinwen, Watters, Paul, Yearwood, John
A new procedure to help system/network administrators identify multiple rootkit infections
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
RBACS : Rootkit behavioral analysis and classification system
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A 3D object encryption scheme which maintains dimensional and spatial stability
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
Are you sure you would like to clear your session, including search history and login status?