Browsing by Author rp00179

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 2 to 21 of 50 < previous   next >
TitleAuthor(s)Issue Date
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
 
The chi-square test when the expected frequencies are less than 5
Proceeding/Conference:Proceedings of the COMPSTAT 2006, 17th Symposium of IASC
2006
 
2004
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
 
2000
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
 
1989
 
An efficient shadow algorithm for area light sources using BSP trees
Proceeding/Conference:Proceedings of Pacific Graphics 98
1998
 
Efficiently rendering large volume data using texture mapping hardware
Proceeding/Conference:Joint EUROGRAPHICS - IEEE TCCG Symposium on Visualization Proceedings
1999
 
Evaluating Kolmogorov's distribution
Journal:Journal of Statistical Software
2003
 
2004
 
Fast generation of discrete random variables
Journal:Journal of Statistical Software
2004
Finding motifs for insufficient number of sequences with strong binding to transcription factor
Proceeding/Conference:RECOMB 2004 - Proceedings of the Eighth Annual International Conference on Research in Computational Molecular Biology
2004
 
2005
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN
2004