nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A case study in hardware Trojan design and implementation
|
Baumgarten, Alex |
|
2010 |
|
1 |
p. 1-14 |
artikel |
2 |
Achieving dynamicity in security policies enforcement using aspects
|
Ayed, Samiha |
|
2017 |
|
1 |
p. 83-103 |
artikel |
3 |
A column dependency-based approach for static and dynamic recovery of databases from malicious transactions
|
Chakraborty, Anindya |
|
2009 |
|
1 |
p. 51-67 |
artikel |
4 |
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
|
Shaikh, Riaz Ahmed |
|
2016 |
|
1 |
p. 91-113 |
artikel |
5 |
A deep learner model for multi-language webshell detection
|
Hannousse, Abdelhakim |
|
|
|
1 |
p. 47-61 |
artikel |
6 |
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation
|
Rajasekaran, Arun Sekar |
|
|
|
1 |
p. 1-13 |
artikel |
7 |
A formalization of card-based cryptographic protocols via abstract machine
|
Mizuki, Takaaki |
|
2013 |
|
1 |
p. 15-23 |
artikel |
8 |
A formal modeling and analysis approach for access control rules, policies, and their combinations
|
Karimi, Vahid R. |
|
2016 |
|
1 |
p. 43-74 |
artikel |
9 |
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
|
Rabie, Osama Bassam J. |
|
|
|
1 |
p. 51-80 |
artikel |
10 |
A general and efficient countermeasure to relation attacks in mix-based e-voting
|
Peng, Kun |
|
2010 |
|
1 |
p. 49-60 |
artikel |
11 |
A multiresolution approach for optimal defense against random attacks
|
Valenzuela, Michael |
|
2014 |
|
1 |
p. 61-72 |
artikel |
12 |
Analysing a stream authentication protocol using model checking
|
Hopcroft, Philippa |
|
2004 |
|
1 |
p. 2-13 |
artikel |
13 |
Analysis and application of Bio-Inspired Multi-Net Security Model
|
Zheng, Ruijuan |
|
2009 |
|
1 |
p. 1-17 |
artikel |
14 |
Analysis of e-commerce protocols: Adapting a traditional technique
|
Gürgens, Sigrid |
|
2003 |
|
1 |
p. 21-36 |
artikel |
15 |
An attack on the isomorphisms of polynomials problem with one secret
|
Geiselmann, Willi |
|
2003 |
|
1 |
p. 59-64 |
artikel |
16 |
A new efficient optimistic fair exchange protocol without random oracles
|
Huang, Qiong |
|
2011 |
|
1 |
p. 53-63 |
artikel |
17 |
A new smart smudge attack using CNN
|
Shin, Hansub |
|
|
|
1 |
p. 25-36 |
artikel |
18 |
An extended access control mechanism exploiting data dependencies
|
Albertini, Davide Alberto |
|
2016 |
|
1 |
p. 75-89 |
artikel |
19 |
An integrated deep learning model for Ethereum smart contract vulnerability detection
|
Jain, Vikas Kumar |
|
|
|
1 |
p. 557-575 |
artikel |
20 |
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network
|
Sharma, Amit |
|
|
|
1 |
p. 119-135 |
artikel |
21 |
A review on fake news detection 3T’s: typology, time of detection, taxonomies
|
Rastogi, Shubhangi |
|
|
|
1 |
p. 177-212 |
artikel |
22 |
A review on graph-based approaches for network security monitoring and botnet detection
|
Lagraa, Sofiane |
|
|
|
1 |
p. 119-140 |
artikel |
23 |
A symbolic framework for multi-faceted security protocol analysis
|
Bracciali, Andrea |
|
2007 |
|
1 |
p. 55-84 |
artikel |
24 |
A t-private k-database information retrieval scheme
|
Blundo, Carlo |
|
2001 |
|
1 |
p. 64-68 |
artikel |
25 |
Authenticating mobile phone users using keystroke analysis
|
Clarke, N. L. |
|
2006 |
|
1 |
p. 1-14 |
artikel |
26 |
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
|
Stergiopoulos, George |
|
|
|
1 |
p. 37-59 |
artikel |
27 |
A warning on how to implement anonymous credential protocols into the information card framework
|
Ates, Mikaël |
|
2011 |
|
1 |
p. 33-40 |
artikel |
28 |
BASPED: Blockchain assisted searchable public key encryption over outsourced data
|
Chakraborty, Partha Sarathi |
|
|
|
1 |
p. 487-503 |
artikel |
29 |
Bayesian rational exchange
|
Estevez-Tapiador, Juan M. |
|
2007 |
|
1 |
p. 85-100 |
artikel |
30 |
Bipartite modular multiplication with twice the bit-length of multipliers
|
Yoshino, Masayuki |
|
2008 |
|
1 |
p. 13-23 |
artikel |
31 |
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
|
Deepa, G. |
|
2017 |
|
1 |
p. 105-120 |
artikel |
32 |
Blockchain-based data integrity framework for Internet of Things
|
Chanal, Poornima M. |
|
|
|
1 |
p. 519-532 |
artikel |
33 |
Blockchain-based multi-diagnosis deep learning application for various diseases classification
|
Rahal, Hakima Rym |
|
|
|
1 |
p. 15-30 |
artikel |
34 |
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
|
Stasinopoulos, Anastasios |
|
2018 |
|
1 |
p. 49-72 |
artikel |
35 |
Computational probabilistic noninterference
|
Backes, Michael |
|
2004 |
|
1 |
p. 42-60 |
artikel |
36 |
Computer security
|
Landwehr, Carl E. |
|
2001 |
|
1 |
p. 3-13 |
artikel |
37 |
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
|
Cheng, Jiin-Chiou |
|
2008 |
|
1 |
p. 37-48 |
artikel |
38 |
Content-based filtering of Web documents: the MaX system and the EUFORBIA project
|
Bertino, Elisa |
|
2003 |
|
1 |
p. 45-58 |
artikel |
39 |
Content-based image authentication: current status, issues, and challenges
|
Han, Shui-Hua |
|
2009 |
|
1 |
p. 19-32 |
artikel |
40 |
Controlled query evaluation for enforcing confidentiality in complete information systems
|
Biskup, Joachim |
|
2004 |
|
1 |
p. 14-27 |
artikel |
41 |
Correction to: A decentralized honeypot for IoT Protocols based on Android devices
|
Lygerou, Irini |
|
|
|
1 |
p. 303 |
artikel |
42 |
Cryptanalysis of a non-interactive deniable ring signature scheme
|
Jia, Huiwen |
|
|
|
1 |
p. 103-112 |
artikel |
43 |
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
|
Amro, Ahmed |
|
|
|
1 |
p. 249-288 |
artikel |
44 |
Cybersecurity challenges in IoT-based smart renewable energy
|
Rekeraho, Alexandre |
|
|
|
1 |
p. 101-117 |
artikel |
45 |
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
|
Silvestri, Stefano |
|
|
|
1 |
p. 31-50 |
artikel |
46 |
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules
|
Kim, Hee Yeon |
|
|
|
1 |
p. 1-23 |
artikel |
47 |
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system
|
Mohamed, Safa |
|
|
|
1 |
p. 235-247 |
artikel |
48 |
Defeating SQL injection attack in authentication security: an experimental study
|
Das, Debasish |
|
2017 |
|
1 |
p. 1-22 |
artikel |
49 |
Deployment and performance evaluation of mobile multicoupon solutions
|
Hinarejos, M. Francisca |
|
2018 |
|
1 |
p. 101-124 |
artikel |
50 |
Design and implementation of Negative Authentication System
|
Dasgupta, Dipankar |
|
2017 |
|
1 |
p. 23-48 |
artikel |
51 |
Detection of adversarial attacks based on differences in image entropy
|
Ryu, Gwonsang |
|
|
|
1 |
p. 299-314 |
artikel |
52 |
Differential audio analysis: a new side-channel attack on PIN pads
|
Souza Faria, Gerson de |
|
2018 |
|
1 |
p. 73-84 |
artikel |
53 |
Distributing security-mediated PKI
|
Vanrenen, Gabriel |
|
2005 |
|
1 |
p. 3-17 |
artikel |
54 |
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps
|
El-Zawawy, Mohamed A. |
|
|
|
1 |
p. 39-58 |
artikel |
55 |
Double-authentication-preventing signatures
|
Poettering, Bertram |
|
2015 |
|
1 |
p. 1-22 |
artikel |
56 |
Double-trapdoor anonymous tags for traceable signatures
|
Abe, Masayuki |
|
2012 |
|
1 |
p. 19-31 |
artikel |
57 |
Early web application attack detection using network traffic analysis
|
Rajić, Branislav |
|
|
|
1 |
p. 77-91 |
artikel |
58 |
Editorial
|
Gollman, Dieter |
|
2001 |
|
1 |
p. 1-2 |
artikel |
59 |
Efficient attribute-based signature and signcryption realizing expressive access structures
|
Rao, Y. Sreenivasa |
|
2015 |
|
1 |
p. 81-109 |
artikel |
60 |
Efficient generation of secure elliptic curves
|
Konstantinou, Elisavet |
|
2006 |
|
1 |
p. 47-63 |
artikel |
61 |
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
|
Dinesh, K. |
|
|
|
1 |
p. 199-223 |
artikel |
62 |
Enhancing attack resilience of cyber-physical systems through state dependency graph models
|
Adamos, Konstantinos |
|
|
|
1 |
p. 187-198 |
artikel |
63 |
Estimating vulnerability metrics with word embedding and multiclass classification methods
|
Kekül, Hakan |
|
|
|
1 |
p. 247-270 |
artikel |
64 |
Federated transfer learning for attack detection for Internet of Medical Things
|
Alharbi, Afnan A. |
|
|
|
1 |
p. 81-100 |
artikel |
65 |
Forensic investigation of the dark web on the Tor network: pathway toward the surface web
|
Jin, Philgeun |
|
|
|
1 |
p. 331-346 |
artikel |
66 |
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs
|
Yoneyama, Kazuki |
|
2016 |
|
1 |
p. 43-66 |
artikel |
67 |
Fractional biometrics: safeguarding privacy in biometric applications
|
Bayly, Duncan |
|
2009 |
|
1 |
p. 69-82 |
artikel |
68 |
Fully non-interactive onion routing with forward secrecy
|
Catalano, Dario |
|
2012 |
|
1 |
p. 33-47 |
artikel |
69 |
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks
|
Mvah, Fabrice |
|
|
|
1 |
p. 373-387 |
artikel |
70 |
Generalized Elias schemes for efficient harvesting of truly random bits
|
Bernardini, Riccardo |
|
2016 |
|
1 |
p. 67-81 |
artikel |
71 |
Gridchain: an investigation of privacy for the future local distribution grid
|
Picazo-Sanchez, Pablo |
|
|
|
1 |
p. 29-46 |
artikel |
72 |
Group signature implies public-key encryption with non-interactive opening
|
Emura, Keita |
|
2013 |
|
1 |
p. 51-62 |
artikel |
73 |
Handling distributed authorization with delegation through answer set programming
|
Wang, Shujing |
|
2006 |
|
1 |
p. 27-46 |
artikel |
74 |
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities
|
Anjum, |
|
|
|
1 |
p. 577-608 |
artikel |
75 |
Identity-based cryptography for grid security
|
Lim, Hoon Wei |
|
2010 |
|
1 |
p. 15-32 |
artikel |
76 |
Implementing public-key cryptography on passive RFID tags is practical
|
Arbit, Alex |
|
2014 |
|
1 |
p. 85-99 |
artikel |
77 |
Improving spam email classification accuracy using ensemble techniques: a stacking approach
|
Adnan, Muhammad |
|
|
|
1 |
p. 505-517 |
artikel |
78 |
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
|
Farao, Aristeidis |
|
|
|
1 |
p. 347-371 |
artikel |
79 |
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
|
Tonicelli, Rafael |
|
2014 |
|
1 |
p. 73-84 |
artikel |
80 |
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions
|
Mashatan, Atefeh |
|
2008 |
|
1 |
p. 49-60 |
artikel |
81 |
Intrusion and intrusion detection
|
McHugh, John |
|
2001 |
|
1 |
p. 14-35 |
artikel |
82 |
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches
|
Sah, Gulab |
|
|
|
1 |
p. 1-27 |
artikel |
83 |
Key substitution attacks revisited: Taking into account malicious signers
|
Bohli, Jens-Matthias |
|
2005 |
|
1 |
p. 30-36 |
artikel |
84 |
Large-scale network intrusion detection based on distributed learning algorithm
|
Tian, Daxin |
|
2008 |
|
1 |
p. 25-35 |
artikel |
85 |
Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR
|
Backes, Michael |
|
2007 |
|
1 |
p. 33-54 |
artikel |
86 |
Low-randomness constant-round private XOR computations
|
Blundo, Carlo |
|
2006 |
|
1 |
p. 15-26 |
artikel |
87 |
Malicious code detection in android: the role of sequence characteristics and disassembling methods
|
Balikcioglu, Pinar G. |
|
|
|
1 |
p. 107-118 |
artikel |
88 |
[m]allotROPism: a metamorphic engine for malicious software variation development
|
Lyvas, Christos |
|
|
|
1 |
p. 61-78 |
artikel |
89 |
Malware analysis using visualized images and entropy graphs
|
Han, Kyoung Soo |
|
2014 |
|
1 |
p. 1-14 |
artikel |
90 |
Measuring and visualizing cyber threat intelligence quality
|
Schlette, Daniel |
|
|
|
1 |
p. 21-38 |
artikel |
91 |
Minimizing TTP's involvement in signature validation
|
Zhou, Jianying |
|
2005 |
|
1 |
p. 37-47 |
artikel |
92 |
MLChain: a privacy-preserving model learning framework using blockchain
|
Bansal, Vidhi |
|
|
|
1 |
p. 649-677 |
artikel |
93 |
Mobile botnet detection: a comprehensive survey
|
Hamzenejadi, Sajad |
|
|
|
1 |
p. 137-175 |
artikel |
94 |
Modeling reporting delays in cyber incidents: an industry-level comparison
|
Sangari, Seema |
|
|
|
1 |
p. 63-76 |
artikel |
95 |
Modeling runtime enforcement with mandatory results automata
|
Dolzhenko, Egor |
|
2014 |
|
1 |
p. 47-60 |
artikel |
96 |
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency
|
Peng, Kun |
|
2010 |
|
1 |
p. 33-47 |
artikel |
97 |
Networked cryptographic devices resilient to capture
|
MacKenzie, Philip |
|
2003 |
|
1 |
p. 1-20 |
artikel |
98 |
NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs
|
Liu, Pengfei |
|
|
|
1 |
p. 59-71 |
artikel |
99 |
Obfuscated integration of software protections
|
Van den Broeck, Jens |
|
|
|
1 |
p. 73-101 |
artikel |
100 |
On private information retrieval supporting range queries
|
Hayata, Junichiro |
|
|
|
1 |
p. 629-647 |
artikel |
101 |
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
|
Sušil, Petr |
|
2015 |
|
1 |
p. 51-65 |
artikel |
102 |
Outbound authentication for programmable secure coprocessors
|
Smith, Sean W. |
|
2004 |
|
1 |
p. 28-41 |
artikel |
103 |
PatrIoT: practical and agile threat research for IoT
|
Süren, Emre |
|
|
|
1 |
p. 213-233 |
artikel |
104 |
Pepal: Penalizing multimedia breaches and partial leakages
|
Mangipudi, Easwar Vivek |
|
|
|
1 |
p. 447-465 |
artikel |
105 |
Perceptual hash function for scalable video
|
Saikia, Navajit |
|
2013 |
|
1 |
p. 81-93 |
artikel |
106 |
PKI past, present and future
|
Lioy, Antonio |
|
2005 |
|
1 |
p. 18-29 |
artikel |
107 |
Plaintext awareness in identity-based key encapsulation
|
Manulis, Mark |
|
2013 |
|
1 |
p. 25-49 |
artikel |
108 |
Portfolio optimization of computer and mobile botnets
|
Liao, Qi |
|
2013 |
|
1 |
p. 1-14 |
artikel |
109 |
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
|
Patruni, Muralidhara Rao |
|
|
|
1 |
p. 679-698 |
artikel |
110 |
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
|
Liu, Weiran |
|
2015 |
|
1 |
p. 35-50 |
artikel |
111 |
Preface
|
Degano, Pierpaolo |
|
2007 |
|
1 |
p. 1 |
artikel |
112 |
Preface
|
Waidner, Michael |
|
2004 |
|
1 |
p. 1 |
artikel |
113 |
Privacy preserving data sharing and analysis for edge-based architectures
|
Sheikhalishahi, Mina |
|
|
|
1 |
p. 79-101 |
artikel |
114 |
Privacy-preserving revocation checking
|
Narasimha, M. |
|
2008 |
|
1 |
p. 61-75 |
artikel |
115 |
Privacy-preserving smart metering revisited
|
Rial, Alfredo |
|
2016 |
|
1 |
p. 1-31 |
artikel |
116 |
Private discovery of common social contacts
|
De Cristofaro, Emiliano |
|
2012 |
|
1 |
p. 49-65 |
artikel |
117 |
Public key versus symmetric key cryptography in client–server authentication protocols
|
Braeken, An |
|
|
|
1 |
p. 103-114 |
artikel |
118 |
Related-key rectangle attack on 36 rounds of the XTEA block cipher
|
Lu, Jiqiang |
|
2008 |
|
1 |
p. 1-11 |
artikel |
119 |
Relations between the security models for certificateless encryption and ID-based key agreement
|
Fiore, D. |
|
2011 |
|
1 |
p. 1-22 |
artikel |
120 |
Restricting data-leakage using fine-grained access control on OSN objects
|
Rathore, Nemi Chandra |
|
|
|
1 |
p. 93-106 |
artikel |
121 |
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
|
Mesbah, Abdelhak |
|
2018 |
|
1 |
p. 85-100 |
artikel |
122 |
Risk model development for information security in organization environment based on business perspectives
|
Ibnugraha, Prajna Deshanta |
|
|
|
1 |
p. 113-126 |
artikel |
123 |
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment
|
Dhingra, Bhavya |
|
|
|
1 |
p. 315-330 |
artikel |
124 |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
|
Yaacoub, Jean-Paul A. |
|
|
|
1 |
p. 115-158 |
artikel |
125 |
RORI-based countermeasure selection using the OrBAC formalism
|
Gonzalez Granadillo, Gustavo |
|
2013 |
|
1 |
p. 63-79 |
artikel |
126 |
Routing management for performance and security tradeoff in wireless mesh networks
|
Silva, Helber |
|
2014 |
|
1 |
p. 35-46 |
artikel |
127 |
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware
|
Ayub, Md. Ahsan |
|
|
|
1 |
p. 533-556 |
artikel |
128 |
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
|
Chen, Yu |
|
2015 |
|
1 |
p. 15-33 |
artikel |
129 |
SAT-based model-checking for security protocols analysis
|
Armando, Alessandro |
|
2007 |
|
1 |
p. 3-32 |
artikel |
130 |
SDN as a defence mechanism: a comprehensive survey
|
Ayodele, Believe |
|
|
|
1 |
p. 141-185 |
artikel |
131 |
Secure and collusion-resistant data aggregation from convertible tags
|
Leontiadis, Iraklis |
|
|
|
1 |
p. 1-20 |
artikel |
132 |
Secure outsourcing of manufacturing compliance checks
|
Triakosia, Aikaterini |
|
|
|
1 |
p. 609-627 |
artikel |
133 |
Secure pay-TV for chained hotels
|
Deng, Hua |
|
2016 |
|
1 |
p. 33-42 |
artikel |
134 |
Secure three-party computational protocols for triangle area
|
Liu, Liang |
|
2015 |
|
1 |
p. 1-13 |
artikel |
135 |
Security assessment and improvement of smart grid NIKE protocol
|
Feng, Tao |
|
|
|
1 |
p. 411-429 |
artikel |
136 |
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware
|
Viţel, Silviu |
|
|
|
1 |
p. 271-297 |
artikel |
137 |
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents
|
Sommervoll, Åvald Åslaugson |
|
|
|
1 |
p. 225-246 |
artikel |
138 |
Simulation extractable versions of Groth’s zk-SNARK revisited
|
Amine, Oussama |
|
|
|
1 |
p. 431-445 |
artikel |
139 |
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
|
Elmiger, Marius |
|
|
|
1 |
p. 467-485 |
artikel |
140 |
Stochastic game net and applications in security analysis for enterprise network
|
Wang, Yuanzhuo |
|
2011 |
|
1 |
p. 41-52 |
artikel |
141 |
Strongly simulation-extractable leakage-resilient NIZK
|
Wang, Yuyu |
|
2015 |
|
1 |
p. 67-79 |
artikel |
142 |
Synthesizing differentially private location traces including co-locations
|
Narita, Jun |
|
|
|
1 |
p. 389-410 |
artikel |
143 |
Temporarily hidden bit commitment and lottery applications
|
Goldschlag, David M. |
|
2009 |
|
1 |
p. 33-50 |
artikel |
144 |
The Elliptic Curve Digital Signature Algorithm (ECDSA)
|
Johnson, Don |
|
2001 |
|
1 |
p. 36-63 |
artikel |
145 |
The MALICIA dataset: identification and analysis of drive-by download operations
|
Nappa, Antonio |
|
2014 |
|
1 |
p. 15-33 |
artikel |
146 |
Threshold distributed access control with public verification: a practical application of PVSS
|
Peng, Kun |
|
2011 |
|
1 |
p. 23-31 |
artikel |
147 |
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage
|
D’Arco, Paolo |
|
2012 |
|
1 |
p. 1-17 |
artikel |
148 |
Track for surveys
|
|
|
|
|
1 |
p. 159 |
artikel |
149 |
Understanding SPKI/SDSI using first-order logic
|
Li, Ninghui |
|
2005 |
|
1 |
p. 48-64 |
artikel |
150 |
User identification using deep learning and human activity mobile sensor data
|
Alawneh, Luay |
|
|
|
1 |
p. 289-301 |
artikel |
151 |
Write-only oblivious RAM-based privacy-preserved access of outsourced data
|
Li, Lichun |
|
2016 |
|
1 |
p. 23-42 |
artikel |
152 |
Zheng and Seberry’s public key encryption scheme revisited
|
Baek, Joonsang |
|
2003 |
|
1 |
p. 37-44 |
artikel |