Showing results 2683 to 2702 of 6006
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Welcome message from LSNS-2012 workshop co-chairs Journal:Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 | 2012 | ||
(Strong) multi-designated verifiers signatures secure against rogue key attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Presentation techniques at international conferences Proceeding/Conference:Invited lecture, Institute of Software, Chinese Academy of Sciences | 2012 | ||
2012 | |||
A Bag-of-Gait Model for Gait Recognition Proceeding/Conference:Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012 | 2012 | ||
Choices, choices: Comparing between CHOC'LATE and the classification-tree methodology Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient information exchange in single-hop multi-channel radio networks Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Retrieving biomedical images through content-based learning from examples using fine granularity Proceeding/Conference:Proceedings of SPIE - International Society for Optical Engineering | 2012 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | ||
Temporal analysis of HFS+ and Mac OS X in digital investigations Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | ||
Distributed multiple-message broadcast in wireless ad-hoc networks under the SINR model Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
An O(log n) distributed approximation algorithm for local broadcasting in unstructured wireless networks Proceeding/Conference:International Conference on Distributed Computing in Sensor Systems Proceedings | 2012 | ||
Software pirates: a criminal investigation Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012 | 2012 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Weighted average problem revisited under hybrid and malicious model Proceeding/Conference:3rd International Conference on Next Generation Information Technology, ICNIT 2012 | 2012 | ||
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud Proceeding/Conference:Conference on Digital Forensics, Security, and Law | 2012 | ||
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET Journal:Journal of Information Security | 2012 |