Found: 4
Select item for more details and to access through your institution.
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 3/4, p. 2855, doi. 10.1007/s11042-019-08292-8
- By:
- Publication type:
- Article
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
- Published in:
- Journal of Information Processing Systems, 2019, v. 15, n. 4, p. 865, doi. 10.3745/JIPS.03.0126
- By:
- Publication type:
- Article
ON A GENERALIZATION OF NC-MCCOY RINGS.
- Published in:
- Miskolc Mathematical Notes, 2017, v. 18, n. 1, p. 337, doi. 10.18514/MMN.2017.1855
- By:
- Publication type:
- Article
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 8, p. 1561, doi. 10.1002/sec.1104
- By:
- Publication type:
- Article