722 results on '"Batten, Lynn"'
Search Results
2. Efficiencies in Binary Elliptic Curves
3. Mobile Money in the Australasian Region - A Technical Security Perspective
4. A New Sign-Change Attack on the Montgomery Ladders
5. Smartphone Applications, Malware and Data Theft
6. A New Rabin-Type Cryptosystem with Modulus $$p^{2}q$$
7. Off-line digital cash schemes providing untraceability, anonymity and change
8. The 0-1 Knapsack Polytope – A Starting Point for Cryptanalysis of Knapsack Ciphers?
9. Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks
10. A Novel Approach for Information Discovery in Wireless Sensor Grids
11. An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones
12. Algebraic Attacks on Clock-Controlled Stream Ciphers
13. Efficiencies in Binary Elliptic Curves
14. PELS: A Noble Architecture and Framework for a Personal E-Learning System (PELS)
15. vPELS: An E-Learning Social Environment for VLSI Design with Content Security Using DRM
16. Contrasting Permission Patterns between Clean and Malicious Android Applications
17. An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss
18. Securing Data Privacy on Mobile Devices in Emergency Health Situations
19. Feature Reduction to Speed Up Malware Classification
20. Using Relationship-Building in Event Profiling for Digital Forensic Investigations
21. Implementing Recovery in Low-Resource Stationary Wireless Sensor Networks
22. Network Resilience in Low-Resource Mobile Wireless Sensor Networks
23. An Anonymity Revocation Technology for Anonymous Communication
24. Robust Correctness Testing for Digital Forensic Tools
25. A Privacy Preserving E-Payment Scheme
26. Designing Information Systems Which Manage or Avoid Privacy Incidents
27. A Trusted Approach to E-Commerce
28. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
29. An Efficient Algorithm for Partitioning and Authenticating Problem-Solutions of eLeaming Contents
30. Algebraic Attacks on Clock-Controlled Cascade Ciphers
31. Algebraic Attacks over GF(q)
32. Classification of malware based on integrated static and dynamic features
33. A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction
34. Mobile Money in the Australasian Region - A Technical Security Perspective
35. A New Sign-Change Attack on the Montgomery Ladders
36. Smartphone Applications, Malware and Data Theft
37. A French-Australian Comparison of Responsibilities for the Monitoring of Security and Privacy Issues Resulting from the Introduction of New Information Technologies
38. Survey in Smartphone Malware Analysis Techniques
39. Demographics and Risk Factors of Pediatric Pulmonary Hypertension Readmissions
40. Robust performance testing for digital forensic tools
41. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
42. The 0-1 Knapsack Polytope – A Starting Point for Cryptanalysis of Knapsack Ciphers?
43. An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones
44. E-commerce: protecting purchaser privacy to enforce trust
45. Wireless broadcast encryption based on smart cards
46. Public Key Cryptography
47. An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss
48. Combinatorics of Finite Geometries
49. Feature Reduction to Speed Up Malware Classification
50. Securing Data Privacy on Mobile Devices in Emergency Health Situations
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.