Found: 32
Select item for more details and to access through your institution.
COMPONENT SECURITY TESTING APPROACH BASED ON EXTENDED CHEMICAL ABSTRACT MACHINE.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2012, v. 22, n. 1, p. 59, doi. 10.1142/S0218194012500039
- By:
- Publication type:
- Article
A Parallel Yet Pipelined Architecture for Efficient Implementation of the Advanced Encryption Standard Algorithm on Reconfigurable Hardware.
- Published in:
- International Journal of Parallel Programming, 2016, v. 44, n. 6, p. 1102, doi. 10.1007/s10766-016-0408-7
- By:
- Publication type:
- Article
On the concept of safety instrumented systems.
- Published in:
- Visión Electrónica, 2014, v. 8, n. 1, p. 186
- By:
- Publication type:
- Article
Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/391986
- By:
- Publication type:
- Article
Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 303, doi. 10.1007/s11042-014-1870-0
- By:
- Publication type:
- Article
Plaintext awareness in identity-based key encapsulation.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 1, p. 25, doi. 10.1007/s10207-013-0218-5
- By:
- Publication type:
- Article
Lessons in Data Governance: A Survey of Legal Developments in Data Management, Privacy and Security.
- Published in:
- Business Lawyer, 2005, v. 61, n. 1, p. 471
- By:
- Publication type:
- Article
Guide to ISO 27001: UAE Case Stud.
- Published in:
- Issues in Informing Science & Information Technology, 2012, v. 9, p. 331
- By:
- Publication type:
- Article
Encrypt Decrypt v1.0: A CRYPTOGRAPHIC APPLICATION FOR SENDING MESSAGES VIA COMMERCIAL EMAIL PROVIDERS.
- Published in:
- Defence S&T Technical Bulletin, 2015, v. 8, n. 1, p. 76
- By:
- Publication type:
- Article
Hardware Implementation of Compact AES S-box.
- Published in:
- IAENG International Journal of Computer Science, 2015, v. 42, n. 2, p. 125
- By:
- Publication type:
- Article
Security Requirements Engineering: A Framework for Representation and Analysis.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 133, doi. 10.1109/TSE.2007.70754
- By:
- Publication type:
- Article
Ciphertext policy attribute based encryption scheme with revocation for cloud storage.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 5, p. 1488, doi. 10.3969/j.issn.1001-3695.2014.05.049
- By:
- Publication type:
- Article
On the (In)Security of Recent Group Key Distribution Protocols.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 507, doi. 10.1093/comjnl/bxw061
- By:
- Publication type:
- Article
Security Proofs for Protocols Involving Humans.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 527, doi. 10.1093/comjnl/bxw066
- By:
- Publication type:
- Article
WIVET-Benchmarking Coverage Qualities of Web Crawlers.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 555, doi. 10.1093/comjnl/bxw072
- By:
- Publication type:
- Article
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 541, doi. 10.1093/comjnl/bxw070
- By:
- Publication type:
- Article
Bounds for Message Authentication with Distortion.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 497, doi. 10.1093/comjnl/bxw060
- By:
- Publication type:
- Article
Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 573, doi. 10.1093/comjnl/bxw081
- By:
- Publication type:
- Article
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 491, doi. 10.1093/comjnl/bxw058
- By:
- Publication type:
- Article
A New Efficient Symmetric Encryption Algorithm Design and Implementation.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 2, p. 102
- By:
- Publication type:
- Article
Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 8, p. 1804, doi. 10.23940/ijpe.18.08.p17.18041814
- By:
- Publication type:
- Article
The INTERSECTION Framework: Applied Security for Heterogeneous Networks.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 22, doi. 10.26636/jtit.2011.1.1130
- By:
- Publication type:
- Article
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1655, doi. 10.1007/s11277-016-3873-9
- By:
- Publication type:
- Article
A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 979, doi. 10.1007/s11277-013-1547-4
- By:
- Publication type:
- Article
Encryption Standards.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 14
- By:
- Publication type:
- Article
Using trust assumptions with security requirements.
- Published in:
- Requirements Engineering, 2006, v. 11, n. 2, p. 138, doi. 10.1007/s00766-005-0023-4
- By:
- Publication type:
- Article
A method for fault recognition in the last three rounds of Advanced Encryption Standard.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2021, v. 57, n. 13, p. 511, doi. 10.1049/ell2.12188
- By:
- Publication type:
- Article
A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol.
- Published in:
- Kirkuk University Journal for Scientific Studies, 2018, v. 13, n. 3, p. 64, doi. 10.32894/kujss.2018.13.3.6
- By:
- Publication type:
- Article
SOFTWARE IMPLEMENTATION OF SECURE FIRMWARE UPDATE IN IOT CONCEPT.
- Published in:
- Advances in Electrical & Electronic Engineering, 2017, v. 15, n. 4, p. 626, doi. 10.15598/aeee.v15i4.2467
- By:
- Publication type:
- Article
Securable and Energy Efficient Transmission in Remote Cooperative Groups: New DES Algorithm.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 205
- By:
- Publication type:
- Article
IMPROVING CRITICAL INFRASTRUCTURE PROTECTION.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 2, p. 59
- By:
- Publication type:
- Article
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 4, p. 379, doi. 10.1142/S012905411750023X
- By:
- Publication type:
- Article