Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 11-20 of 47 total results
Open Access Journals Search Engine (OAJSE) : Computer Science
Journal of Mobile, Embedded and Distributed Systems Journal of Modelling and Simulation of Systems Journal of Multimedia Journal of Networks Journal of Object Technology Journal of Pattern Recognition Research Journal of Physical Agents Journal of Research and Practice in Information Technology Journal of Security Engineering
Hiding Malicious Content in PDF Documents
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 121 other file format. This will not invalidate the digital signature, as no bits of the actual file were altered. This met hod is known as the Dali Attack, named after the famous painter [4], [5]. The first demonstration of the attack was
https://arxiv.org/pdf/1201.0397
Average Rating (0 votes)
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
https://arxiv.org/pdf/1201.0395
Average Rating (0 votes)
An Approach to Mobile Multimedia Digital Rights Management ...
Toma, C., Boja, C.: Survey of Mobile Digital Rights Management Platforms. Journal of Mobile, Embedded and Distributed Systems 1(1), 32–42 (2009) Google Scholar
Different Obfuscation Techniques for Code Protection ...
Peer-review under responsibility of the Organizing Committee of ICECCS 2015 doi: 10.1016/j.procs.2015.10.114 ScienceDirect 4thInternational Conference on Eco-friendly Computing and Communication Systems Different Obfuscation Techniques for Code Protection Chandan Kumar Beheraa*, D. Lalitha Bhaskari b a,bDepartment of Computer Science & Systems ...
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
 PERSONAL INFORMATION Cristian Valeriu TOMA
PERSONAL INFORMATION Cristian Valeriu TOMA 15-17, Calea Dorobanţilor Street, District 1, Bucharest, 010552, Romania +40213 191 900 - 310 ... „Journal of Mobile, Embedded and Distributed Systems”, vol. 1 Mobile and Wireless Applications, no. 1, March 30, 2009, pg. 32 – 42, ...
Projects – ISM – IT&C Security Master – Informatics ...
Projects IOT Laboratory. Researching and Implementting Security for IOT. SECITC ... International Conference on Information Technology and Communications Security. Events / Tech. JMEDS. Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. Maskitto Light WordPress Theme by ...
ism.ase.ro/?page_id=101
Average Rating (0 votes)
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.
[PDF] Internet Banking Two-Factor Authentication using ...
Journal of Mobile, Embedded and Distributed Systems This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application.
1 2 3 4 5
Pages
|