Found: 7
Select item for more details and to access through your institution.
A secure architecture for TCP/UDP-based cloud communications.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 161, doi. 10.1007/s10207-020-00511-w
- By:
- Publication type:
- Article
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 181, doi. 10.1007/s10207-020-00510-x
- By:
- Publication type:
- Article
Studying lattice reduction algorithms improved by quick reordering technique.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 257, doi. 10.1007/s10207-020-00501-y
- By:
- Publication type:
- Article
An SDN approach to detect targeted attacks in P2P fully connected overlays.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 245, doi. 10.1007/s10207-020-00499-3
- By:
- Publication type:
- Article
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 127, doi. 10.1007/s10207-020-00488-6
- By:
- Publication type:
- Article
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 141, doi. 10.1007/s10207-020-00487-7
- By:
- Publication type:
- Article
Secure and efficient wildcard search over encrypted data.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 199, doi. 10.1007/s10207-020-00492-w
- By:
- Publication type:
- Article