Works about DATA transmission system security measures


Results: 72
    1
    2
    3
    4
    5

    The privacy conundrum.

    Published in:
    ITNOW, 2008, v. 50, n. 2, p. 18, doi. 10.1093/itnow/bwn031
    Publication type:
    Article
    6
    7

    Engineering Privacy.

    Published in:
    IEEE Transactions on Software Engineering, 2009, v. 35, n. 1, p. 67
    By:
    • Spiekerman, Sarah;
    • Cranor, Lorrie Faith
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37

    Information flow safety in multiparty sessions.

    Published in:
    Mathematical Structures in Computer Science, 2016, v. 26, n. 8, p. 1352, doi. 10.1017/S0960129514000619
    By:
    • CAPECCHI, SARA;
    • CASTELLANI, ILARIA;
    • DEZANI-CIANCAGLINI, MARIANGIOLA
    Publication type:
    Article
    38

    INCREASING SECURITY IN CLOUD ENVIRONMENT.

    Published in:
    Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2013, v. 11, n. 2, p. 237
    By:
    • Sugata SANYAL;
    • Priyanka NAIK
    Publication type:
    Article
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48

    ENHANCED SECURITY FOR DATA TRANSFER IN CLOUD.

    Published in:
    International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 270, doi. 10.26483/ijarcs.v9i2.5569
    By:
    • Gurupriya, S.;
    • Aishwarya, R.;
    • Parveen, H. Refana;
    • Periasamy, J. K.
    Publication type:
    Article
    49

    SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.

    Published in:
    International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
    By:
    • Nath, Ratnadeep;
    • Saha, Bishal;
    • Laskar, Aminullah;
    • Majumder, Sudipta
    Publication type:
    Article
    50