Works about DATA transmission system security measures
1
- Journal Européen des Systèmes Automatisés, 2018, v. 51, n. 4-6, p. 283, doi. 10.3166/JESA.51.283-293
- Singamaneni, Kranthi Kumar;
- Naidu, Pasala Sanyasi;
- Kumar, Pasupuleti Venkata Siva
- Article
2
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/846739
- Zhu, Shuhua;
- Li, Xiaojie;
- Zhu, Chunsheng;
- Shu, Lei;
- Sun, Wei
- Article
3
- Adhoc & Sensor Wireless Networks, 2018, v. 42, n. 1/2, p. 63
- REKIK, MALEK;
- MAKHLOUF, AMEL;
- ZARAI, FAOUZI;
- OBAIDAT, MOHAMMAD S.
- Article
4
- EURASIP Journal on Wireless Communications & Networking, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13638-016-0560-1
- Article
5
- ITNOW, 2008, v. 50, n. 2, p. 18, doi. 10.1093/itnow/bwn031
- Article
6
- Actualidad Jurídica (1578-956X), 2017, n. 45, p. 36
- Article
7
- IEEE Transactions on Software Engineering, 2009, v. 35, n. 1, p. 67
- Spiekerman, Sarah;
- Cranor, Lorrie Faith
- Article
8
- International Journal of Science, Innovation & New Technology, 2016, v. 1, n. 16, p. 25
- IDRIZI, Florim;
- MEMETI, Agon;
- RAHMANI, Burhan
- Article
9
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 121, doi. 10.1007/s11036-013-0454-y
- Chou, Yao-Hsin;
- Zeng, Guo-Jyun;
- Lin, Fang-Jhu;
- Chen, Chi-Yuan;
- Chao, Han-Chieh
- Article
10
- Journal of Mathematical Cryptology, 2015, v. 9, n. 4, p. 205, doi. 10.1515/jmc-2013-0046
- Article
11
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/3567323
- Chen, Dechuan;
- Yang, Weiwei;
- Hu, Jianwei;
- Cai, Yueming;
- Zhu, Sen
- Article
12
- Journal of Applied Security Research, 2015, v. 10, n. 2, p. 221, doi. 10.1080/19361610.2015.1004512
- Jayarin, P. Jesu;
- Visumathi, J.;
- Srilakshmi, R.;
- Pendyala, Madhuri
- Article
13
- Applied Clinical Trials, 2001, v. 10, n. 8, p. 21
- Article
14
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. 929, doi. 10.1109/TDSC.2010.48
- Wu, Jiang;
- Stinson, Doug R.
- Article
15
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 410, doi. 10.1109/TDSC.2010.2
- Article
16
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 812, doi. 10.1007/s12083-015-0361-z
- Haraty, Ramzi;
- Zbib, Mirna;
- Masud, Mehedi
- Article
17
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 876, doi. 10.1007/s12083-015-0378-3
- Lloret, Jaime;
- Sendra, Sandra;
- Jimenez, Jose;
- Parra, Lorena
- Article
18
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 1, p. 14, doi. 10.6109/jicce.2017.15.1.14
- Abbas, Mohammed Adil;
- Jun-Pyo Hong
- Article
19
- Computer und Recht, 2020, v. 36, n. 2, p. 82, doi. 10.9785/cr-2020-360209
- Article
20
- International Journal of Network Management, 2015, v. 25, n. 5, p. 263, doi. 10.1002/nem.1902
- Bartos, Karel;
- Rehak, Martin
- Article
21
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5133, doi. 10.1002/sec.1683
- Zhang, Pei;
- Liu, Yi-Liang;
- Zhang, Jian-ming;
- Wang, Liang-min
- Article
22
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2016, v. 68, n. 4, p. 27
- Bucur, Gabriela;
- Cangea, Otilia;
- Popescu, Cristina
- Article
23
- Technical Journal of University of Engineering & Technology Taxila, 2018, v. 23, n. 2, p. 50
- Anwar, M.;
- Abdullah, A. H.;
- Butt, R. A.;
- Ashraf, M. W.;
- Qureshi, K. N.;
- Ullah, F.
- Article
24
- Chemical Engineering, 2018, v. 125, n. 9, p. 44
- Article
25
- Journal: American Water Works Association, 2013, v. 105, n. 6, p. 18, doi. 10.5942/jawwa.2013.105.0091
- Article
26
- ASHRAE Transactions, 2006, v. 112, n. 2, p. 671
- Lathrop, Scott D.;
- Gates, Christopher L.;
- Massie, Darrell D.
- Article
27
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 2, p. 777, doi. 10.1007/s13369-013-0686-y
- Najafzadeh, Sara;
- Ithnin, Norafida;
- Razak, Shukor;
- Karimi, Ramin
- Article
28
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8311, doi. 10.1007/s11042-018-6813-8
- Yao, Heng;
- Liu, Xiaokai;
- Tang, Zhenjun;
- Qin, Chuan;
- Tian, Ying
- Article
29
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 24063, doi. 10.1007/s11042-016-4111-x
- Tayal, Neha;
- Bansal, Ritesh;
- Dhal, Sangeeta;
- Gupta, Shailender
- Article
30
- Multimedia Tools & Applications, 2017, v. 76, n. 4, p. 6031, doi. 10.1007/s11042-015-3142-z
- Cheng, Po-Hsin;
- Chang, Ko-Chin;
- Liu, Chiang-Lung
- Article
31
- Multimedia Tools & Applications, 2015, v. 74, n. 5, p. 1645, doi. 10.1007/s11042-014-2019-x
- Chang, Ya;
- Huang, Cheng-Ta;
- Huang, Chia-Ling;
- Wang, Shiuh-Jeng
- Article
32
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3055, doi. 10.1007/s11277-018-5994-9
- Article
33
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 201, doi. 10.1007/s11277-018-5835-x
- Jayaraman, Sathiamoorthy;
- Bhagavathiperumal, Ramakrishnan;
- Mohanakrishnan, Usha
- Article
34
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- Soumyasri, S. M.;
- Ballal, Rajkiran
- Article
35
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3923, doi. 10.1007/s11277-017-4359-0
- Cai, Ruo;
- Tan, Wesley;
- Chong, Peter
- Article
36
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 287, doi. 10.1007/s11277-015-3063-1
- Kim, Seokhoon;
- Na, Wonshik
- Article
37
- Mathematical Structures in Computer Science, 2016, v. 26, n. 8, p. 1352, doi. 10.1017/S0960129514000619
- CAPECCHI, SARA;
- CASTELLANI, ILARIA;
- DEZANI-CIANCAGLINI, MARIANGIOLA
- Article
38
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2013, v. 11, n. 2, p. 237
- Sugata SANYAL;
- Priyanka NAIK
- Article
39
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/2970673
- Xie, Mingshan;
- Huang, Mengxing;
- Bai, Yong;
- Hu, Zhuhua
- Article
40
- Defence Science Journal, 2016, v. 66, n. 2, p. 146, doi. 10.14429/dsj.66.9705
- Rath, Mamata;
- Pattanayak, Binod Kumar;
- Pati, Bibudhendu
- Article
41
- 2019
- Chen, Weimin;
- Chen, Zhigang;
- Cui, Fang
- journal article
42
- Journal of Supercomputing, 2012, v. 59, n. 1, p. 22, doi. 10.1007/s11227-010-0413-3
- Majzoub, Sohaib;
- Diab, Hassan
- Article
43
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 1, p. 27, doi. 10.26634/jcom.3.1.3439
- REDDY, D. SRUJAN CHANDRA;
- KUMAR, V. V. SUNIL
- Article
44
- Iraqi Journal of Science, 2021, v. 62, n. 11, p. 4110, doi. 10.24996/ijs.2021.62.11.31
- Ali, Rawaa Hamza;
- Kadhim, Jamal Mohamed
- Article
45
- Denver Law Review, 2016, v. 93, n. 4, p. 833
- Article
46
- Financial Executive, 2005, v. 21, n. 8, p. 12
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
47
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 287, doi. 10.26483/ijarcs.v9i2.5673
- Saha, Kausik;
- Ghosh, Sirshendu Sekhar;
- Shaw, Dilip Kumar
- Article
48
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 270, doi. 10.26483/ijarcs.v9i2.5569
- Gurupriya, S.;
- Aishwarya, R.;
- Parveen, H. Refana;
- Periasamy, J. K.
- Article
49
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- Nath, Ratnadeep;
- Saha, Bishal;
- Laskar, Aminullah;
- Majumder, Sudipta
- Article
50
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 240, doi. 10.26483/ijarcs.v9i2.5521
- Singla, Neeru;
- Kaur, Rajbir
- Article