Found: 32
Select item for more details and to access through your institution.
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 14, p. 3983, doi. 10.3390/s20143983
- By:
- Publication type:
- Article
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 18, p. 3869, doi. 10.3390/s19183869
- By:
- Publication type:
- Article
Byzantine-resilient dual gossip membership management in clouds.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 9, p. 3011, doi. 10.1007/s00500-017-2553-3
- By:
- Publication type:
- Article
A dynamic trust model exploiting the time slice in WSNs.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2014, v. 18, n. 9, p. 1829, doi. 10.1007/s00500-014-1377-7
- By:
- Publication type:
- Article
Reverse-safe authentication protocol for secure USB memories.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 8, p. 834, doi. 10.1002/sec.580
- By:
- Publication type:
- Article
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1127, doi. 10.2298/CSIS130921068W
- By:
- Publication type:
- Article
PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 975, doi. 10.2298/CSIS130917060G
- By:
- Publication type:
- Article
A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 913, doi. 10.2298/CSIS121114041G
- By:
- Publication type:
- Article
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/7672941
- By:
- Publication type:
- Article
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
- Published in:
- Journal of Sensors, 2018, p. 1, doi. 10.1155/2018/2089626
- By:
- Publication type:
- Article
Towards 5G-based IoT security analysis against Vo5G eavesdropping.
- Published in:
- Computing, 2021, v. 103, n. 3, p. 425, doi. 10.1007/s00607-020-00855-0
- By:
- Publication type:
- Article
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems.
- Published in:
- Journal of Supercomputing, 2014, v. 67, n. 3, p. 653, doi. 10.1007/s11227-013-0960-5
- By:
- Publication type:
- Article
A new iterative learning control scheme using the geometric rotation for discrete time systems.
- Published in:
- Computer Systems Science & Engineering, 2012, v. 27, n. 5, p. 355
- By:
- Publication type:
- Article
Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 11, p. 6510, doi. 10.3390/app13116510
- By:
- Publication type:
- Article
CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 11, p. 6369, doi. 10.3390/app13116369
- By:
- Publication type:
- Article
Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 5, p. 2894, doi. 10.3390/app13052894
- By:
- Publication type:
- Article
Better Not to Use Vulnerability's Reference for Exploitability Prediction.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 7, p. 2555, doi. 10.3390/app10072555
- By:
- Publication type:
- Article
Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 4, p. 1286, doi. 10.3390/app10041286
- By:
- Publication type:
- Article
Vulnerability analysis on the image‐based authentication: Through the WM_INPUT message.
- Published in:
- Concurrency & Computation: Practice & Experience, 2020, v. 32, n. 18, p. 1, doi. 10.1002/cpe.5596
- By:
- Publication type:
- Article
Ransomware prevention technique using key backup.
- Published in:
- Concurrency & Computation: Practice & Experience, 2018, v. 30, n. 3, p. 1, doi. 10.1002/cpe.4337
- By:
- Publication type:
- Article
Context-aware HCI service selection.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 231
- By:
- Publication type:
- Article
Detection of cross site scripting attack in wireless networks using n-Gram and SVM.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 275
- By:
- Publication type:
- Article
Flexible multi-authority attribute-based signature schemes for expressive policy.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 255
- By:
- Publication type:
- Article
Condensation-based routing in mobile ad-hoc networks.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 199
- By:
- Publication type:
- Article
Joint redundant and random network coding for robust video transmission over lossy networks.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 213
- By:
- Publication type:
- Article
Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 177
- By:
- Publication type:
- Article
Advances in Network-based Information Systems.
- Published in:
- Mobile Information Systems, 2012, v. 8, n. 3, p. 173, doi. 10.1155/2012/901247
- By:
- Publication type:
- Article
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
- Published in:
- Mobile Information Systems, 2011, v. 7, n. 3, p. 241, doi. 10.3233/MIS-2011-0120
- By:
- Publication type:
- Article
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 10, p. 4728, doi. 10.3390/s23104728
- By:
- Publication type:
- Article
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 7, p. 3501, doi. 10.3390/s23073501
- By:
- Publication type:
- Article
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 6, p. 3023, doi. 10.3390/s23063023
- By:
- Publication type:
- Article
An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 389, doi. 10.1080/10798587.2015.1126950
- By:
- Publication type:
- Article