Found: 8
Select item for more details and to access through your institution.
Identity‐based remote data possession checking in public clouds.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 114, doi. 10.1049/iet-ifs.2012.0271
- By:
- Publication type:
- Article
Approach for malware identification using dynamic behaviour and outcome triggering.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 140, doi. 10.1049/iet-ifs.2012.0343
- By:
- Publication type:
- Article
Establishing user trust in automated teller machine integrity.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 132, doi. 10.1049/iet-ifs.2012.0220
- By:
- Publication type:
- Article
Operating system security by integrity checking and recovery using write‐protected storage.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 122, doi. 10.1049/iet-ifs.2012.0346
- By:
- Publication type:
- Article
Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 104, doi. 10.1049/iet-ifs.2012.0206
- By:
- Publication type:
- Article
Research of trust model based on fuzzy theory in mobile ad hoc networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 88, doi. 10.1049/iet-ifs.2012.0145
- By:
- Publication type:
- Article
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 80, doi. 10.1049/iet-ifs.2012.0202
- By:
- Publication type:
- Article
Identity management and trusted interaction in Internet and mobile computing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 67, doi. 10.1049/iet-ifs.2012.0133
- By:
- Publication type:
- Article