Found: 14
Select item for more details and to access through your institution.
Integrity Verification of Distributed Nodes in Critical Infrastructures.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 6950, doi. 10.3390/s22186950
- By:
- Publication type:
- Article
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 18, p. 6057, doi. 10.3390/s21186057
- By:
- Publication type:
- Article
The Trusted Platform Agent.
- Published in:
- IEEE Software, 2011, v. 28, n. 2, p. 35, doi. 10.1109/MS.2010.160
- By:
- Publication type:
- Article
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure †.
- Published in:
- Information (2078-2489), 2019, v. 10, n. 6, p. 210, doi. 10.3390/info10060210
- By:
- Publication type:
- Article
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2425983
- By:
- Publication type:
- Article
Quantum Key Distribution in Kubernetes Clusters.
- Published in:
- Future Internet, 2022, v. 14, n. 6, p. 160, doi. 10.3390/fi14060160
- By:
- Publication type:
- Article
Characterization of the Digital Identity of Chilean University Students Considering Their Personal Learning Environments.
- Published in:
- Future Internet, 2021, v. 13, n. 3, p. 74, doi. 10.3390/fi13030074
- By:
- Publication type:
- Article
PKI past, present and future.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 1, p. 18, doi. 10.1007/s10207-005-0077-9
- By:
- Publication type:
- Article
On the Performance of Secure Vehicular Communication Systems.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. 898, doi. 10.1109/TDSC.2010.58
- By:
- Publication type:
- Article
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
- Published in:
- Software: Practice & Experience, 2019, v. 49, n. 11, p. 1643, doi. 10.1002/spe.2738
- By:
- Publication type:
- Article
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
- Published in:
- Software: Practice & Experience, 2015, v. 45, n. 11, p. 1457, doi. 10.1002/spe.2292
- By:
- Publication type:
- Article
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
- Published in:
- Software: Practice & Experience, 2013, v. 43, n. 12, p. 1489, doi. 10.1002/spe.2148
- By:
- Publication type:
- Article
Inter-function anomaly analysis for correct SDN/NFV deployment.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 1, p. 25, doi. 10.1002/nem.1917
- By:
- Publication type:
- Article
Smart Card Security and Applications (Book review).
- Published in:
- 2003
- By:
- Publication type:
- Book Review