284 results on '"Jajodia, S."'
Search Results
2. Access Control Policies and Languages in Open Environments
3. Metadata Management in Outsourced Encrypted Databases
4. Providing different degrees of recency options to transactions in multilevel secure databases
5. Selective Data Encryption in Outsourced Dynamic Environments
6. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
7. Modeling requests among cooperating intrusion detection systems
8. Spam Filter Analysis
9. An operation-based metric for CPA resistance
10. Attack Tree Generation by Policy Invalidation
11. Creating objects in the flexible authorization framework
12. Cyber SA : situational awareness for cyber defense
13. Privacy Design Strategies
14. Dismantling MIFARE Classic
15. Dependable and Resilient Cloud Computing
16. On Linkability and Malleability in Self-blindable Credentials
17. Alternative methods for the reconstruction of trees from their traversals
18. Post-quantum cryptography
19. Witness hiding
20. Vector Space
21. Oblivious transfer
22. Decoding algorithms
23. Factorization circuits
24. Hash based signatures
25. Threshold homomorphic cryptosystems
26. Proof of knowledge vs. Proof of membership
27. Encyclopedia of Cryptography and Security
28. Interactive argument
29. Protocol
30. Formal privacy analysis of communication protocols for identity management
31. Edwards Curves
32. Authorization enforcement in distributed query evaluation
33. Pairing-based key exchange
34. Multiparty computation
35. Interactive proof
36. Verifiable secret sharing
37. Zero-knowledge
38. Privacy Design Strategies
39. Preserving confidentiality of security policies in data outsourcing scenarios
40. Chinese Remainder Theorem
41. Measuring intrusion detection capability : an information-theoretic approach
42. Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures
43. Non-interactive proof
44. Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases
45. Maintaining privacy on derived objects
46. Integrity and internal control in information systems
47. Integration of integrity constraints in database federations
48. 6th IFIP TC-11 WG 11.5 conference on integrity and internal control in information systems
49. Secure dynamic fragment allocation in a large-scale distributed file system
50. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.