Showing results 1 to 20 of 24
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
What an Investigator Needs to Know about Encryption & Tracking Technologies Proceeding/Conference:Asia Cyber Crime Summit | 2001 | ||
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | ||
Routing and Channel Reservation Strategies for a Low Earth Orbit Satellite System Proceeding/Conference:IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security | 2000 | ||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | ||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | ||
Optimized routing scheme and a channel reservation strategy for a low earth orbit satellite system Proceeding/Conference:IEEE Vehicular Technology Conference | 1999 | ||
Optimal Routing with Different Classes of Packets for Computer Networks Proceeding/Conference:World Multiconference on Systemics, Cybernetics and Informatics | 2001 | ||
On-demand Multi-lingual Font Service on Heterogeneous Computer Platform Proceeding/Conference:World Conference of the Web Society | 1996 | ||
MIX-crowds, an anonymity scheme for file retrieval systems Proceeding/Conference:Proceedings of the IEEE Infocom | 2009 | ||
Location updates and probabilistic tracking algorithms for mobile cellular networks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 1999 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Font Structure for Heterogeneous Chinese Computing Environment Proceeding/Conference:International Conference on Parallel and Distributed Processing Techniques and Applications | 1997 | ||
Discrete channel assignment with message priority for packet-switched networks Proceeding/Conference:Proceedings - IEEE Military Communications Conference | 1990 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 |