You are here

Search results

Searching as anonymous (not verified)

8 items found in collection [showing 1 - 8]
  • CSV Spreadsheet
APECS
APECS
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Predator and Prey Alert System
Predator and Prey Alert System
Secure Real-Time Conversations
Secure Real-Time Conversations
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Legally Resilient Signatures
Legally Resilient Signatures
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains