Works matching DE "PUBLIC key infrastructure (Computer security)"
1
- ISSA Journal, 2020, v. 18, n. 5, p. 5
- Article
2
- ISSA Journal, 2019, v. 17, n. 1, p. 11
- Article
3
- ISSA Journal, 2017, v. 15, n. 11, p. 5
- Article
4
- ISSA Journal, 2016, v. 14, n. 11, p. 8
- Article
5
- Electronics (2079-9292), 2021, v. 10, n. 4, p. 391, doi. 10.3390/electronics10040391
- Na, Dongjun;
- Park, Sejin;
- Prieto, Javier;
- Prieta, Fernando De la
- Article
6
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1104, doi. 10.14569/ijacsa.2024.01504112
- Masmoudi, Atef;
- Saeed, Maha
- Article
7
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 264, doi. 10.14569/ijacsa.2024.0150427
- Sweetania, Dhian;
- M. T., Suryadi;
- Madenda, Sarifuddin
- Article
8
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 2, p. 1, doi. 10.1155/2014/814510
- Lattanzi, Emanuele;
- Freschi, Valerio;
- Bogliolo, Alessandro
- Article
9
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 86, doi. 10.1080/15501320802575013
- Yang, Yatao;
- Pan, Shaoming
- Article
10
- International Journal of Distributed Sensor Networks, 2008, v. 4, n. 4, p. 287, doi. 10.1080/15501320701260261
- Article
11
- PLoS ONE, 2022, v. 17, n. 9, p. 1, doi. 10.1371/journal.pone.0274695
- Yang, Xiaodong;
- Ren, Ningning;
- Chen, Aijia;
- Wang, Zhisong;
- Wang, Caifen
- Article
12
- International Arab Journal of Information Technology (IAJIT), 2016, v. 13, n. 1, p. 38
- Selvakumaraswamy, Shivkumar;
- Govindaswamy, Umamaheswari
- Article
13
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 3, p. 262
- Lakshmanan, Thulasimani;
- Muthusamy, Madheswaran
- Article
14
- Adhoc & Sensor Wireless Networks, 2019, v. 43, n. 3/4, p. 261
- Janani V. S.;
- ManiKandan, M. S. K.
- Article
15
- Adhoc & Sensor Wireless Networks, 2012, v. 16, n. 1-3, p. 29
- Wenmin Li;
- Qiaoyan Wen;
- Qi Su;
- Zhengping Jin;
- Yanjiong Wang
- Article
16
- Adhoc & Sensor Wireless Networks, 2012, v. 14, n. 3/4, p. 251
- KYUSUK HAN;
- KWANGJO KIM;
- WOOK CHOI;
- HYO HYUN CHOI;
- JUNGTAEK SEO;
- TAESHIK SHON
- Article
17
- ITNOW, 2018, v. 60, n. 4, p. 65, doi. 10.1093/itnow/bwy113
- Tweneboah-Koduah, Samuel;
- J. Buchanan, William
- Article
18
- ITNOW, 2015, v. 57, n. 3, p. 36, doi. 10.1093/itnow/bwv072
- Article
19
- Quality & Reliability Engineering International, 2012, v. 28, n. 8, p. 825, doi. 10.1002/qre.1270
- Lin, Jingqiang;
- Jing, Jiwu;
- Liu, Peng
- Article
20
- Issues in Information Systems, 2016, v. 17, n. 4, p. 145
- Ebersold, Kyle;
- Glass, Richard
- Article
21
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3749, doi. 10.3969/j.issn.1001-3695.2013.12.060
- WANG Yong-feng;
- HU Yun-hong
- Article
22
- International Journal of Science, Innovation & New Technology, 2012, p. 1
- ARANITASI, Marin;
- SHEME, Enida;
- IBRO, Marsida
- Article
23
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 367
- PURA, Mihai Lica;
- PATRICIU, Victor Valeriu
- Article
24
- Mobile Networks & Applications, 2016, v. 21, n. 1, p. 149, doi. 10.1007/s11036-016-0703-y
- Memarmoshrefi, Parisa;
- Seibel, Roman;
- Hogrefe, Dieter
- Article
25
- Mobile Networks & Applications, 2013, v. 18, n. 3, p. 413, doi. 10.1007/s11036-012-0406-y
- Freudiger, Julien;
- Jadliwala, Murtuza;
- Hubaux, Jean-Pierre;
- Niemi, Valtteri;
- Ginzboorg, Philip
- Article
26
- Symmetry (20738994), 2019, v. 11, n. 10, p. 1315, doi. 10.3390/sym11101315
- Zúquete, André;
- Gomes, Hélder;
- Amaral, João;
- Oliveira, Carlos
- Article
27
- Symmetry (20738994), 2019, v. 11, n. 7, p. 913, doi. 10.3390/sym11070913
- Guo, Lifeng;
- Wang, Jing;
- Yau, Wei-Chuen
- Article
28
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- Ramadan, Mohammed;
- Guohong Du;
- Fagen Li;
- Chunxiang Xu
- Article
29
- Journal of Mathematical Cryptology, 2011, v. 4, n. 4, p. 375, doi. 10.1515/JMC.2011.004
- Wolf, Christopher;
- Preneel, Bart
- Article
30
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/174383
- Jung, Seung Wook;
- Jung, Souhwan
- Article
31
- Ciência Florestal (01039954), 2020, v. 30, n. 1, p. 18, doi. 10.5902/1980509822299
- de Souza, Natália Dias;
- de Assis Leão, Talles;
- Júnior, Ananias Francisco Dias;
- de Carvalho, Alexandre Monteiro;
- da Silva, Eduardo Vinicius
- Article
32
- Journal of Applied Security Research, 2017, v. 12, n. 3, p. 440, doi. 10.1080/19361610.2017.1315761
- Sarde, Pankaj;
- Banerjee, Amitabh;
- Dewangan, C. L.
- Article
33
- International Journal of Computers, Communications & Control, 2008, v. 3, n. 4, p. 395, doi. 10.15837/ijccc.2008.4.2407
- Zhong Xu;
- Xue Liu;
- Guoqing Zhang;
- Wenbo He
- Article
34
- Journal of Algorithms & Computational Technology, 2012, v. 6, n. 3, p. 395, doi. 10.1260/1748-3018.6.3.395
- Britto, S.;
- Kumar, R.;
- Rabara, S. Albert
- Article
35
- Issues in Informing Science & Information Technology, 2013, v. 10, p. 413, doi. 10.28945/1819
- Pulkkis, Göran;
- Yazdani, Farzan
- Article
36
- Issues in Informing Science & Information Technology, 2009, v. 6, p. 649, doi. 10.28945/1087
- Ehmke, Martin;
- Forsgren, Harri;
- Grahn, Kaj;
- Karlsson, Jonny;
- Karvi, Timo;
- Pulkkis, Göran
- Article
37
- Journal of Homeland Security & Emergency Management, 2011, v. 8, n. 1, p. 1, doi. 10.2202/1547-7355.1785
- Article
38
- New Review of Information Networking, 2004, v. 10, n. 2, p. 193, doi. 10.1080/13614570500091940
- Article
39
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 677, doi. 10.1007/s00779-011-0434-9
- Han, Kyusuk;
- Mun, Hyeran;
- Shon, Taeshik;
- Yeun, Chan;
- Park, James
- Article
40
- Turkish Journal of Electrical Engineering & Computer Sciences, 2003, v. 11, n. 3, p. 223
- Biçakci, Kemal;
- Baykal, Nazife
- Article
41
- Information Systems Management, 2010, v. 27, n. 4, p. 320, doi. 10.1080/10580530.2010.514188
- Marković, Milan;
- Đorđević, Goran
- Article
42
- Information Systems Management, 2006, v. 23, n. 2, p. 56, doi. 10.1201/1078.10580530/45925.23.2.20060301/92674.7
- Mendoza, Luis E.;
- Pérez, María;
- Grimán, Anna
- Article
43
- Ingeniería (0121-750X), 2014, v. 19, n. 1, p. 50
- Alonso, Paulo;
- García, Gaona;
- Enrique, Carlos;
- Marín, Montenegro;
- Wiesner González, Helvert
- Article
44
- Information Sciences & Technologies: Bulletin of the ACM Slovakia, 2015, v. 7, n. 1, p. 1
- Article
45
- International Journal on Information Technologies & Security, 2015, v. 7, n. 3, p. 3
- Osmanli, Aleksandar;
- Iliev, Alanas
- Article
46
- Wireless Networks (10220038), 2019, v. 25, n. 2, p. 845, doi. 10.1007/s11276-017-1597-8
- Hong, Jiaojiao;
- Liu, Bo;
- Sun, Qianyuan;
- Li, Fagen
- Article
47
- Wireless Networks (10220038), 2016, v. 22, n. 3, p. 879, doi. 10.1007/s11276-015-1005-1
- Dolev, Shlomi;
- Krzywiecki, Łukasz;
- Panwar, Nisha;
- Segal, Michael
- Article
48
- Wireless Networks (10220038), 2009, v. 15, n. 2, p. 259, doi. 10.1007/s11276-007-0051-8
- Kuriakose, George;
- Harsha, Sri;
- Kumar, Anurag;
- Sharma, Vinod
- Article
49
- Computational Intelligence, 2015, v. 31, n. 2, p. 327, doi. 10.1111/coin.12025
- Costante, Elisa;
- Hartog, Jerry;
- Petković, Milan
- Article
50
- ISeCure, 2017, v. 9, n. 1, p. 3
- Rastegari, Parvin;
- Berenjkoub, Mehdi
- Article