You are here

Search results

Searching as anonymous (not verified)

14 items found in collection [showing 1 - 14]
  • CSV Spreadsheet
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software          Systems
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software Systems
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Trust Management in Mobile Wireless Networks
Trust Management in Mobile Wireless Networks
Predator and Prey Alert System
Predator and Prey Alert System
Secure Real-Time Conversations
Secure Real-Time Conversations
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Legally Resilient Signatures
Legally Resilient Signatures
Customizable Learning Objects Metadata Authoring
Customizable Learning Objects Metadata Authoring
Reuse of Personal Software Assets
Reuse of Personal Software Assets
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
On Lid Allocation and Assignment in Infiniband Networks
On Lid Allocation and Assignment in Infiniband Networks
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library