Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Markowsky, George")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 162

  • Page / 7
Export

Selection :

  • and

SAM 2010 : proceedings of the 2010 international conference on security & management (Las Vegas NV, July 12-15, 2010)Arabnia, Hamid R; Daimi, Kevin; Grimaila, Michael R et al.Security & management. International conferenceWorldComp'2010. 2010, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 2 vol, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5Conference Proceedings

A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret SharingYEH, Jyh-Haw.Security & management. International conferenceWorldComp'2011. 2011, pp 150-156, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Application Resilience with Process FailuresMCGILL, K; TAYLOR, S.Security & management. International conferenceWorldComp'2011. 2011, pp 365-371, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Chaos-Based Symmetric Key CryptosystemsWOOD, Christopher A.Security & management. International conferenceWorldComp'2011. 2011, pp 679-685, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Defence Against Dos Attacks Using a Partitioned Overlay NetworkUSMAN SAEED, Muhammad.Security & management. International conferenceWorldComp'2011. 2011, pp 358-361, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 4 p.Conference Paper

Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware AttacksWILSON, Mark; LEI CHEN.Security & management. International conferenceWorldComp'2011. 2011, pp 667-671, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Information Security Policy Concerns as Case Law Shifts toward Balance between Employer Security and Employee PrivacyJUNGCK, Kathleen; RAHMAN, M.Security & management. International conferenceWorldComp'2011. 2011, pp 605-609, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Methods of Speeding Up Secret Computations With Insecure Auxiliary ComputerSEITKULOV, Yerzhan N.Security & management. International conferenceWorldComp'2011. 2011, pp 409-412, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 4 p.Conference Paper

A Review of Approaching Customer Online Banking Authentication Against Cyber AttacksUTAKRIT, Nattakant.Security & management. International conferenceWorldComp'2010. 2010, pp 703-708, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 6 p.Conference Paper

Digital Image Steganography Using Matrix AdditionMARGAROV, G; MARKAROV, V.Security & management. International conferenceWorldComp'2010. 2010, pp 565-571, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Firewall Configuration based on Specifications of Access Policy and Network EnvironmentTITOV, A; ZABOROVSKY, V.Security & management. International conferenceWorldComp'2010. 2010, pp 146-151, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 6 p.Conference Paper

Secure Cryptosystem Implementation for Authentication DongleVINCHURKAR, Shrikant. P.Security & management. International conferenceWorldComp'2010. 2010, pp 160-163, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 4 p.Conference Paper

The Application of One-Way Hash Functions in Information Security ProtocolsSUN, Jonathan Z.Security & management. International conferenceWorldComp'2010. 2010, pp 43-49, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Travelling Information For Intrusion Prevention SystemsMIGLIARDI, M; STRINGHINI, G.Security & management. International conferenceWorldComp'2010. 2010, pp 23-29, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Data Center Physical Security Ontology for Automated EvaluationJANPITAK, Nanta; SATHITWIRIYAWONG, Chanboon.Security & management. International conferenceWorldComp'2011. 2011, pp 78-84, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Descriptive Analyses of Trusted Security Kernels and Autonomous Systems: Evolution of Security ApproachesWORKMAN, Michael.Security & management. International conferenceWorldComp'2011. 2011, pp 171-179, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 9 p.Conference Paper

Detecting Undetectable Metamorphic VirusesVENKATACHALAM, Sujandharan; STAMP, Mark.Security & management. International conferenceWorldComp'2011. 2011, pp 340-345, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 6 p.Conference Paper

Mobile Security Threats and Issues - A Broad Overview of Mobile Device SecurityLEI ZHANG.Security & management. International conferenceWorldComp'2011. 2011, pp 672-678, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Modern Hash Function ConstructionDENTON, B; ADHAMI, R.Security & management. International conferenceWorldComp'2011. 2011, pp 479-483, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing SystemsFABISIAK, Boleslaw.Security & management. International conferenceWorldComp'2011. 2011, pp 661-666, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 6 p.Conference Paper

Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity EducationMARKOWSKY, G; MARKOWSKY, L.Security & management. International conferenceWorldComp'2011. 2011, pp 507-511, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

A Framework for Smart Trusted Indicators for Browsers (STIB)DESTI, Jude; HONGMEI CHI.Security & management. International conferenceWorldComp'2010. 2010, pp 361-367, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-AttacksHORNER, Jack K.Security & management. International conferenceWorldComp'2010. 2010, pp 94-98, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

A Quantum Key Distribution ProtocolLALA, P. K.Security & management. International conferenceWorldComp'2010. 2010, pp 225-228, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 4 p.Conference Paper

An SELinux Sourcebook for Cybersecurity EducatorsMARKOWSKY, Linda.Security & management. International conferenceWorldComp'2010. 2010, pp 248-254, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

  • Page / 7