Found: 8
Select item for more details and to access through your institution.
Steganalysis of BCH code based stego schemes.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 207, doi. 10.1007/s11235-018-0457-x
- By:
- Publication type:
- Article
A secure wireless mission critical networking system for unmanned aerial vehicle communications.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 237, doi. 10.1007/s11235-018-0460-2
- By:
- Publication type:
- Article
Age-based anonymity: a randomized routing approach to communication unobservability.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 223, doi. 10.1007/s11235-018-0459-8
- By:
- Publication type:
- Article
ID-based proxy re-signature without pairing.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 217, doi. 10.1007/s11235-018-0458-9
- By:
- Publication type:
- Article
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 253, doi. 10.1007/s11235-018-0461-1
- By:
- Publication type:
- Article
Using mobile phones to enhance computing platform trust.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 187, doi. 10.1007/s11235-018-0456-y
- By:
- Publication type:
- Article
A probabilistic model for anonymity analysis of anonymous communication networks.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 171, doi. 10.1007/s11235-018-0454-0
- By:
- Publication type:
- Article
Introduction to the special issue on secure communications.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 2, p. 169, doi. 10.1007/s11235-018-0455-z
- Publication type:
- Article