Robustness Analysis of Privacy-Preserving Hybrid Recommendation Algorithm.Published in:International Journal of Information Security Science, 2015, v. 4, n. 1, p. 13By:Gune, İhsan;Polat, HüseyinPublication type:Article
AN ENCRYPTION KEY MANAGEMENT APPROACH FOR CONFIGURATION FILES.Published in:International Journal of Information Security Science, 2015, v. 4, n. 1, p. 1By:MOUKOUOP NGUENA, Ibrahim;MOUPOJOU MATANGO, Emmanuel;ATSA ETOUNDI, RogerPublication type:Article