Network Security 2013-2014
Network Security 2013-2014
S.NO 6SSNS0 1 6SSNS0 2 6SSNS0 3 6SSNS0 4 6SSNS0 5 6SSNS0 6 6SSNS0 7 6SSNS0 8 6SSNS0 9 6SSNS1 0 6SSNS1 1 6SSNS1 2
NETWORK SECURITY Unprivileged Black-Box Detection of User-Space Keyloggers Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing Security and Privacy-Enhancing Multicloud Architectures Entrusting Private Computation and Data to Untrusted Networks Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data DNS for Massive-Scale Command and Control WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections Non-Cooperative Location Privacy SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network The Foundational Work of Harrison-Ruzzo-Ullman Revisited
PHP
DOTNET
DOTNET DOTNET
JAVA
DOTNET
JAVA DOTNET
DOTNET
No 112, Danam Building 2nd Floor, 1st Main Road, Senthil Nagar, Chinna Porur, Chennai 600 087
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks On Inference-Proof View Processing of XML Documents A System for Timely and Controlled Information Sharing in Emergency Situations Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing Malware Clearance for Secure Commitment of OS-Level Virtual Machines
DOTNET
DOTNET DOTNET
DOTNET
DOTNET