×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [collusion attacks]
Identity based secure distributed data storage schemes
327 views
DIGITAL BLIND AUDIO WATERMARKING FOR E-LEARNING MEDIA By: Youngseock Lee, Jongweon Kim Research done at: Chungwoon University, Sangmyung University
224 views
Fescim fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks.bak
835 views
Identity Based Secure Distributed Storage Scheme
929 views
JAVA 2013 IEEE NETWORKSECURITY PROJECT Identity based secure distributed data storage
373 views
Identity based secure distributed data storage schemes
14 views
Making Contribution-Aware P2P Systems Robust to Collusion Attacks Using Bandwidth Puzzles Vyas Sekar, Carnegie Mellon University Joint work with Michael
219 views
WIRELESS SENSOR NETWORK Pair-Wise Key Establishment Presented By: Mohammed Saleh CS 599b Summer07
217 views
The Holey Grail A special score function for non-binary traitor tracing Boris Škorić Jan-Jaap Oosterwijk Jeroen Doumen
215 views
Collusion-Resistant Anonymous Data Collection Method
31 views
T HE W ORLD OF TLS Security, Attacks, TLS 1.3. HTTPS:// AND FTPS:// AND …. Have you done any of the following today? E-shopping: Amazon, Ebay, Audible,
215 views
Asymptotic channel capacity of collusion resistant watermarking for non-binary alphabets
18 views
Next >