Search

Your search keyword '"Batten, Lynn"' showing total 722 results

Search Constraints

Start Over You searched for: Author "Batten, Lynn" Remove constraint Author: "Batten, Lynn"
722 results on '"Batten, Lynn"'

Search Results

1. A New Rabin-Type Cryptosystem with Modulus

2. Efficiencies in Binary Elliptic Curves

3. Mobile Money in the Australasian Region - A Technical Security Perspective

4. A New Sign-Change Attack on the Montgomery Ladders

5. Smartphone Applications, Malware and Data Theft

8. The 0-1 Knapsack Polytope – A Starting Point for Cryptanalysis of Knapsack Ciphers?

11. An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones

12. Algebraic Attacks on Clock-Controlled Stream Ciphers

14. PELS: A Noble Architecture and Framework for a Personal E-Learning System (PELS)

15. vPELS: An E-Learning Social Environment for VLSI Design with Content Security Using DRM

16. Contrasting Permission Patterns between Clean and Malicious Android Applications

18. Securing Data Privacy on Mobile Devices in Emergency Health Situations

19. Feature Reduction to Speed Up Malware Classification

20. Using Relationship-Building in Event Profiling for Digital Forensic Investigations

22. Network Resilience in Low-Resource Mobile Wireless Sensor Networks

24. Robust Correctness Testing for Digital Forensic Tools

26. Designing Information Systems Which Manage or Avoid Privacy Incidents

27. A Trusted Approach to E-Commerce

28. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks

29. An Efficient Algorithm for Partitioning and Authenticating Problem-Solutions of eLeaming Contents

30. Algebraic Attacks on Clock-Controlled Cascade Ciphers

31. Algebraic Attacks over GF(q)

Catalog

Books, media, physical & digital resources