-
1
-
-
1842454700
-
Securing against the threat of instant messengers
-
March 2004
-
Gunter Ollmann (2004). Securing against the threat of instant messengers. Network Security, Vol. 2004, March 2004, pp. 8-11.
-
(2004)
Network Security
, vol.2004
, pp. 8-11
-
-
Ollmann, G.1
-
2
-
-
33746287237
-
Instant messaging vs. instant compromise
-
July 2006
-
Shirley O'Sullivan (2006). Instant messaging vs. instant compromise. Network Security, Vol. 2006, Issue 7, July 2006, pp. 4-6.
-
(2006)
Network Security
, vol.2006
, Issue.7
, pp. 4-6
-
-
O'Sullivan, S.1
-
3
-
-
77956182636
-
Why shy people use instant messaging: Loneliness and other motives
-
C. Albert Bardi, Michael F. Brady (2010). Why shy people use instant messaging: Loneliness and other motives. Computer in Human Behaviour, 26(2010), pp. 1722-1726.
-
(2010)
Computer in Human Behaviour
, vol.26
, Issue.2010
, pp. 1722-1726
-
-
Bardi, C.A.1
Brady, M.F.2
-
4
-
-
33846796060
-
Building a secure instant messaging environment
-
January 2007
-
Donal Casey (2007). Building a secure instant messaging environment. Network Security, Vol. 2007, January 2007, pp. 18-20.
-
(2007)
Network Security
, vol.2007
, pp. 18-20
-
-
Casey, D.1
-
5
-
-
0009910346
-
Shyness and sociability
-
Cheek, J.M., & Buss, A.H. (1981). Shyness and sociability. Journal of Personality and Social Psuchology, 41(2), pp. 330-339.
-
(1981)
Journal of Personality and Social Psuchology
, vol.41
, Issue.2
, pp. 330-339
-
-
Cheek, J.M.1
Buss, A.H.2
-
6
-
-
33846253665
-
Multi-mode operator for SHA-2 hash functions
-
Ryan Glabb, Laurent Imbert, Graham Jullien, Arnaud Tisserand, Nicolas Veyrat Charvillion (2007). Multi-mode operator for SHA-2 hash functions. Journal of System Architecture 53(2007), pp. 127-138.
-
(2007)
Journal of System Architecture
, vol.53
, Issue.2007
, pp. 127-138
-
-
Glabb, R.1
Imbert, L.2
Jullien, G.3
Tisserand, A.4
Charvillion, N.V.5
-
7
-
-
77957556170
-
VLSI Design and implementation of combined secure hash algorithm SHA-512
-
CNSA 2010
-
R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi (2010). VLSI Design and implementation of combined secure hash algorithm SHA-512. CNSA 2010, CCIS 89, pp. 105-113.
-
(2010)
CCIS
, vol.89
, pp. 105-113
-
-
Kayalvizhi, R.1
Subramanian, R.H.2
Santhosh, R.G.3
Gurubaran, J.4
Vaidehi, V.5
-
8
-
-
33750729555
-
Improving SHA-2 hardware implementations
-
CHES 2006
-
Ricardo Chaves, George Kuzmanov (2006). Improving SHA-2 hardware implementations. CHES 2006, LNCS 4249, pp. 298-310.
-
(2006)
LNCS
, vol.4249
, pp. 298-310
-
-
Chaves, R.1
Kuzmanov, G.2
-
9
-
-
41549107480
-
Phychometric analysis of the short-form UCLA loneliness scale (ULS-8) in Taiwanese undergraduate students
-
Wu, C.-h., & Yao, G. (2008). Phychometric analysis of the short-form UCLA loneliness scale (ULS-8) in Taiwanese undergraduate students. Personality and Individual Differences, 44(8), pp. 1762-1771.
-
(2008)
Personality and Individual Differences
, vol.44
, Issue.8
, pp. 1762-1771
-
-
Wu, C.-H.1
Yao, G.2
-
10
-
-
74549156342
-
A hash-based image encryption algorithm
-
Abbas Cheddab, Joan Condell, Kevin Curran, Paul McKevitt (2010). A hash-based image encryption algorithm. Optics communications 283, pp. 879-893.
-
(2010)
Optics Communications
, vol.283
, pp. 879-893
-
-
Cheddab, A.1
Condell, J.2
Curran, K.3
McKevitt, P.4
|