nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures
|
Seo, Jae Hong |
|
2017 |
|
2 |
p. 193-220 |
artikel |
2 |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
|
Goenka, Richa |
|
|
|
2 |
p. 819-848 |
artikel |
3 |
Adding support to XACML for multi-domain user to user dynamic delegation of authority
|
Chadwick, David W. |
|
2008 |
|
2 |
p. 137-152 |
artikel |
4 |
A deep learning approach based on multi-view consensus for SQL injection detection
|
Kakisim, Arzu Gorgulu |
|
|
|
2 |
p. 1541-1556 |
artikel |
5 |
A distributed digital rights management model for secure information-distribution systems
|
Abie, Habtamu |
|
2004 |
|
2 |
p. 113-128 |
artikel |
6 |
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining
|
Kuzlu, Murat |
|
|
|
2 |
p. 319-332 |
artikel |
7 |
A framework for establishing trust in Cloud provenance
|
Abbadi, Imad M. |
|
2012 |
|
2 |
p. 111-128 |
artikel |
8 |
A framework for secure execution of software
|
Maña, Antonio |
|
2004 |
|
2 |
p. 99-112 |
artikel |
9 |
A game-theoretic approach for integrity assurance in resource-bounded systems
|
Laszka, Aron |
|
2017 |
|
2 |
p. 221-242 |
artikel |
10 |
A graph-theoretical model of computer security
|
Burgess, Mark |
|
2004 |
|
2 |
p. 70-85 |
artikel |
11 |
A hybrid approach to vector-based homomorphic tallying remote voting
|
Mateu, Víctor |
|
2015 |
|
2 |
p. 211-221 |
artikel |
12 |
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
|
Bhale, Pradeepkumar |
|
|
|
2 |
p. 915-934 |
artikel |
13 |
All sail, no anchor II: Acceptable high-end PKI
|
Blakley, B. |
|
2003 |
|
2 |
p. 66-77 |
artikel |
14 |
A method for identifying compromised clients based on DNS traffic analysis
|
Stevanovic, Matija |
|
2016 |
|
2 |
p. 115-132 |
artikel |
15 |
A methodology for ensuring fair allocation of CSOC effort for alert investigation
|
Shah, Ankit |
|
2018 |
|
2 |
p. 199-218 |
artikel |
16 |
A methodology to measure and monitor level of operational effectiveness of a CSOC
|
Shah, Ankit |
|
2017 |
|
2 |
p. 121-134 |
artikel |
17 |
A modular cyber security training programme for the maritime domain
|
Oruc, Aybars |
|
|
|
2 |
p. 1477-1512 |
artikel |
18 |
An adaptive threat model for security ceremonies
|
Martina, Jean Everson |
|
2014 |
|
2 |
p. 103-121 |
artikel |
19 |
An analysis of accuracy experiments carried out over of a multi-faceted model of trust
|
Quinn, Karl |
|
2009 |
|
2 |
p. 103-119 |
artikel |
20 |
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
|
Tyagi, Gaurav |
|
|
|
2 |
p. 935-962 |
artikel |
21 |
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152
|
Saikam, Jalaiah |
|
|
|
2 |
p. 1037-1054 |
artikel |
22 |
An intrusion detection approach based on incremental long short-term memory
|
Zhou, Hanxun |
|
|
|
2 |
p. 433-446 |
artikel |
23 |
A novel malicious remote administration tool using stealth and self-defense techniques
|
Kazoleas, Ioannis |
|
|
|
2 |
p. 357-378 |
artikel |
24 |
An SDN approach to detect targeted attacks in P2P fully connected overlays
|
Medina-López, Cristóbal |
|
|
|
2 |
p. 245-255 |
artikel |
25 |
An SSH predictive model using machine learning with web proxy session logs
|
Lee, Junwon |
|
|
|
2 |
p. 311-322 |
artikel |
26 |
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
|
Asad, H. |
|
|
|
2 |
p. 1331-1346 |
artikel |
27 |
Applying NLP techniques to malware detection in a practical environment
|
Mimura, Mamoru |
|
|
|
2 |
p. 279-291 |
artikel |
28 |
A review on digital twins for power generation and distribution
|
Heluany, Jessica B. |
|
|
|
2 |
p. 1171-1195 |
artikel |
29 |
A secure architecture for TCP/UDP-based cloud communications
|
Faisal, Abu |
|
|
|
2 |
p. 161-179 |
artikel |
30 |
A semantic-aware log generation method for network activities
|
Yichiet, Aun |
|
|
|
2 |
p. 161-177 |
artikel |
31 |
ASICS: authenticated key exchange security incorporating certification systems
|
Boyd, Colin |
|
2016 |
|
2 |
p. 151-171 |
artikel |
32 |
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022
|
Mishra, Kailash Chandra |
|
|
|
2 |
p. 403-415 |
artikel |
33 |
A survey and characterization of Close Access Cyberspace Operations
|
Villalón-Huerta, Antonio |
|
|
|
2 |
p. 963-980 |
artikel |
34 |
A survey on run-time packers and mitigation techniques
|
Alkhateeb, Ehab |
|
|
|
2 |
p. 887-913 |
artikel |
35 |
A systematic mapping study on security for systems of systems
|
Olivero, Miguel Angel |
|
|
|
2 |
p. 787-817 |
artikel |
36 |
Attacks on smart grid: power supply interruption and malicious power generation
|
Adepu, Sridhar |
|
|
|
2 |
p. 189-211 |
artikel |
37 |
A uniform approach for access control and business models with explicit rule realization
|
Karimi, Vahid R. |
|
2015 |
|
2 |
p. 145-171 |
artikel |
38 |
Authenticated logarithmic-order supersingular isogeny group key exchange
|
Hougaard, Hector B. |
|
|
|
2 |
p. 207-221 |
artikel |
39 |
Authentication-enabled attribute-based access control for smart homes
|
Burakgazi Bilgen, Melike |
|
|
|
2 |
p. 479-495 |
artikel |
40 |
Authentication in mobile devices through hand gesture recognition
|
Guerra-Casanova, J. |
|
2012 |
|
2 |
p. 65-83 |
artikel |
41 |
Automated benchmark network diversification for realistic attack simulation with application to moving target defense
|
Bajic, Alexander |
|
|
|
2 |
p. 253-278 |
artikel |
42 |
Behavior-based approach to detect spam over IP telephony attacks
|
Jabeur Ben Chikha, Randa |
|
2015 |
|
2 |
p. 131-143 |
artikel |
43 |
BlindIdM: A privacy-preserving approach for identity management as a service
|
Nuñez, David |
|
2014 |
|
2 |
p. 199-215 |
artikel |
44 |
Blockchain-based multi-organizational cyber risk management framework for collaborative environments
|
El Amin, Habib |
|
|
|
2 |
p. 1231-1249 |
artikel |
45 |
Browser-in-the-Middle (BitM) attack
|
Tommasi, Franco |
|
|
|
2 |
p. 179-189 |
artikel |
46 |
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
|
Andriotis, Panagiotis |
|
|
|
2 |
p. 381-401 |
artikel |
47 |
Cashing out crypto: state of practice in ransom payments
|
Patsakis, Constantinos |
|
|
|
2 |
p. 699-712 |
artikel |
48 |
Certificate revocation system implementation based on the Merkle hash tree
|
Muñoz, Jose L. |
|
2003 |
|
2 |
p. 110-124 |
artikel |
49 |
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications
|
Solano, Jesus |
|
|
|
2 |
p. 181-197 |
artikel |
50 |
Complete analysis of configuration rules to guarantee reliable network security policies
|
Alfaro, J. G. |
|
2007 |
|
2 |
p. 103-122 |
artikel |
51 |
Conditional reactive simulatability
|
Backes, Michael |
|
2007 |
|
2 |
p. 155-169 |
artikel |
52 |
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
|
Ben Attia, Hasiba |
|
|
|
2 |
p. 241 |
artikel |
53 |
Counting equations in algebraic attacks on block ciphers
|
Knudsen, Lars R. |
|
2009 |
|
2 |
p. 127-135 |
artikel |
54 |
Cryptanalysis of the convex hull click human identification protocol
|
Asghar, Hassan Jameel |
|
2012 |
|
2 |
p. 83-96 |
artikel |
55 |
Cryptanalytic time–memory trade-off for password hashing schemes
|
Chang, Donghoon |
|
2018 |
|
2 |
p. 163-180 |
artikel |
56 |
Cryptographically sound security proofs for basic and public-key Kerberos
|
Backes, Michael |
|
2011 |
|
2 |
p. 107-134 |
artikel |
57 |
Cyberattack defense mechanism using deep learning techniques in software-defined networks
|
Rao, Dimmiti Srinivasa |
|
|
|
2 |
p. 1279-1291 |
artikel |
58 |
Cybersecurity training and healthcare: the AERAS approach
|
Frati, Fulvio |
|
|
|
2 |
p. 1527-1539 |
artikel |
59 |
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem
|
Prantl, Thomas |
|
|
|
2 |
p. 1149-1169 |
artikel |
60 |
Defense against membership inference attack in graph neural networks through graph perturbation
|
Wang, Kai |
|
|
|
2 |
p. 497-509 |
artikel |
61 |
Delegation in role-based access control
|
Crampton, Jason |
|
2007 |
|
2 |
p. 123-136 |
artikel |
62 |
Denial of service attacks and defenses in decentralized trust management
|
Li, Jiangtao |
|
2008 |
|
2 |
p. 89-101 |
artikel |
63 |
Design and analysis of DDoS mitigating network architecture
|
Swati, |
|
|
|
2 |
p. 333-345 |
artikel |
64 |
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
|
Patil, Rajendra |
|
|
|
2 |
p. 147-162 |
artikel |
65 |
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
|
Niktabe, Sepideh |
|
|
|
2 |
p. 1293-1316 |
artikel |
66 |
Discretionary capability confinement
|
Fong, Philip W. L. |
|
2007 |
|
2 |
p. 137-154 |
artikel |
67 |
Distributed access control for information-centric networking architectures using verifiable credentials
|
Alzahrani, Bander |
|
|
|
2 |
p. 467-478 |
artikel |
68 |
Dynamic reversed accumulator
|
Kuo, Tsung-Min |
|
2017 |
|
2 |
p. 183-191 |
artikel |
69 |
Editorial
|
Gollmann, Dieter |
|
2007 |
|
2 |
p. 101 |
artikel |
70 |
Enhanced GeoProof: improved geographic assurance for data in the cloud
|
Albeshri, Aiiad |
|
2013 |
|
2 |
p. 191-198 |
artikel |
71 |
Enhanced Tacit Secrets: System-assigned passwords you can’t write down, but don’t need to
|
Joudaki, Zeinab |
|
2018 |
|
2 |
p. 239-255 |
artikel |
72 |
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning
|
El Mendili, Fatna |
|
|
|
2 |
p. 1359-1388 |
artikel |
73 |
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
|
Hamila, Firas |
|
|
|
2 |
p. 1131-1148 |
artikel |
74 |
Evaluating the impact of filter-based feature selection in intrusion detection systems
|
Zouhri, Houssam |
|
|
|
2 |
p. 759-785 |
artikel |
75 |
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors
|
Alsaleh, Mansour |
|
2012 |
|
2 |
p. 97-110 |
artikel |
76 |
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics
|
Brama, Haya |
|
|
|
2 |
p. 525-540 |
artikel |
77 |
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
|
Ince, Kenan |
|
|
|
2 |
p. 1117-1130 |
artikel |
78 |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
|
Ahmad, Tahir |
|
|
|
2 |
p. 379-408 |
artikel |
79 |
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems
|
Toreini, Ehsan |
|
|
|
2 |
p. 981-997 |
artikel |
80 |
Formal analysis for robust anti-SPIT protection using model checking
|
Gritzalis, Dimitris |
|
2012 |
|
2 |
p. 121-135 |
artikel |
81 |
Formal modeling and automatic enforcement of Bring Your Own Device policies
|
Armando, Alessandro |
|
2014 |
|
2 |
p. 123-140 |
artikel |
82 |
Formal validation of automated policy refinement in the management of network security systems
|
Albuquerque, João Porto de |
|
2010 |
|
2 |
p. 99-125 |
artikel |
83 |
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees
|
Faizan Ali, Rao |
|
|
|
2 |
p. 1197-1213 |
artikel |
84 |
Generating adversarial examples with collaborative generative models
|
Xu, Lei |
|
|
|
2 |
p. 1077-1091 |
artikel |
85 |
Generating ICS vulnerability playbooks with open standards
|
Empl, Philip |
|
|
|
2 |
p. 1215-1230 |
artikel |
86 |
Generating visible RSA public keys for PKI
|
Laih, C.S. |
|
2004 |
|
2 |
p. 103-109 |
artikel |
87 |
Hiding information against structural re-identification
|
Gulyás , Gábor György |
|
2018 |
|
2 |
p. 125-139 |
artikel |
88 |
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
|
Akiyama, Mitsuaki |
|
2017 |
|
2 |
p. 135-151 |
artikel |
89 |
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates
|
An, Qin |
|
|
|
2 |
p. 305-317 |
artikel |
90 |
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
|
Mohammadi, Reza |
|
|
|
2 |
p. 367-379 |
artikel |
91 |
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy
|
Zheng, Jian-Wu |
|
2018 |
|
2 |
p. 141-162 |
artikel |
92 |
Information security and privacy challenges of cloud computing for government adoption: a systematic review
|
Ukeje, Ndukwe |
|
|
|
2 |
p. 1459-1475 |
artikel |
93 |
Integrating the edge computing paradigm into the development of IoT forensic methodologies
|
Castelo Gómez, Juan Manuel |
|
|
|
2 |
p. 1093-1116 |
artikel |
94 |
Intrusion detection for power grid: a review
|
Dasgupta, Rupshali |
|
|
|
2 |
p. 1317-1329 |
artikel |
95 |
ISM-AC: an immune security model based on alert correlation and software-defined networking
|
Melo, Roberto Vasconcelos |
|
|
|
2 |
p. 191-205 |
artikel |
96 |
Lightweight energy consumption-based intrusion detection system for wireless sensor networks
|
Riecker, Michael |
|
2014 |
|
2 |
p. 155-167 |
artikel |
97 |
Link-time smart card code hardening
|
Keulenaer, Ronald De |
|
2015 |
|
2 |
p. 111-130 |
artikel |
98 |
Locating collaborative attack targets based on physical invariants toward cyber-physical systems
|
Xun, Peng |
|
|
|
2 |
p. 999-1017 |
artikel |
99 |
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow
|
Munonye, Kindson |
|
|
|
2 |
p. 223-237 |
artikel |
100 |
Maritime cybersecurity: protecting digital seas
|
Martínez, Ferney |
|
|
|
2 |
p. 1429-1457 |
artikel |
101 |
Message from the Guest Editors
|
Yang, Guomin |
|
2016 |
|
2 |
p. 223-224 |
artikel |
102 |
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis
|
Yildirim, Metehan |
|
|
|
2 |
p. 239-251 |
artikel |
103 |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
|
Spreitzenbarth, Michael |
|
2014 |
|
2 |
p. 141-153 |
artikel |
104 |
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture
|
Elmufti, Kalid |
|
2008 |
|
2 |
p. 77-87 |
artikel |
105 |
Multi-device anonymous authentication
|
Kluczniak, Kamil |
|
2018 |
|
2 |
p. 181-197 |
artikel |
106 |
Multi-operator wireless mesh networks secured by an all-encompassing security architecture
|
Egners, André |
|
2014 |
|
2 |
p. 169-186 |
artikel |
107 |
Network intrusion detection and mitigation in SDN using deep learning models
|
Maddu, Mamatha |
|
|
|
2 |
p. 849-862 |
artikel |
108 |
Olympus: a GDPR compliant blockchain system
|
Gonçalves, Ricardo Martins |
|
|
|
2 |
p. 1021-1036 |
artikel |
109 |
On detecting co-resident cloud instances using network flow watermarking techniques
|
Bates, Adam |
|
2013 |
|
2 |
p. 171-189 |
artikel |
110 |
On hash functions using checksums
|
Gauravaram, Praveen |
|
2009 |
|
2 |
p. 137-151 |
artikel |
111 |
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
|
Tiloca, Marco |
|
2016 |
|
2 |
p. 173-193 |
artikel |
112 |
On security arguments of the second round SHA-3 candidates
|
Andreeva, Elena |
|
2012 |
|
2 |
p. 103-120 |
artikel |
113 |
On the measurement of privacy as an attacker’s estimation error
|
Rebollo-Monedero, David |
|
2012 |
|
2 |
p. 129-149 |
artikel |
114 |
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem
|
Rizomiliotis, Panagiotis |
|
2012 |
|
2 |
p. 151-154 |
artikel |
115 |
Optimization of parallel firewalls filtering rules
|
Hadjadj, Taha Elamine |
|
|
|
2 |
p. 323-340 |
artikel |
116 |
Password guessers under a microscope: an in-depth analysis to inform deployments
|
Parish, Zach |
|
|
|
2 |
p. 409-425 |
artikel |
117 |
PiSHi: click the images and I tell if you are a human
|
Mehrnezhad, Maryam |
|
2016 |
|
2 |
p. 133-149 |
artikel |
118 |
PKI design based on the use of on-line certification authorities
|
Lopez, Javier |
|
2003 |
|
2 |
p. 91-102 |
artikel |
119 |
Preface
|
|
|
2011 |
|
2 |
p. 61 |
artikel |
120 |
Preface to the special issue on PKI
|
Dawson, E. |
|
2003 |
|
2 |
p. 65 |
artikel |
121 |
Preventing sensitive relationships disclosure for better social media preservation
|
Raad, Elie |
|
2015 |
|
2 |
p. 173-194 |
artikel |
122 |
Principles of remote attestation
|
Coker, George |
|
2011 |
|
2 |
p. 63-81 |
artikel |
123 |
Privacy-enhanced architecture for smart metering
|
Gómez Mármol, Félix |
|
2012 |
|
2 |
p. 67-82 |
artikel |
124 |
Probabilistic timing covert channels: to close or not to close?
|
Di Pierro, Alessandra |
|
2010 |
|
2 |
p. 83-106 |
artikel |
125 |
Protocols useful on the Internet from distributed signature schemes
|
Daza, Vanesa |
|
2004 |
|
2 |
p. 61-69 |
artikel |
126 |
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
|
Patruni, Muralidhara Rao |
|
|
|
2 |
p. 1019 |
artikel |
127 |
Radio frequency fingerprinting techniques for device identification: a survey
|
Abbas, Sohail |
|
|
|
2 |
p. 1389-1427 |
artikel |
128 |
Resolving privacy-preserving relationships over outsourced encrypted data storages
|
Huertas Celdrán, Alberto |
|
2015 |
|
2 |
p. 195-209 |
artikel |
129 |
Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection
|
Singh, Ankit |
|
2016 |
|
2 |
p. 195-211 |
artikel |
130 |
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study
|
Chatzoglou, Efstratios |
|
|
|
2 |
p. 347-365 |
artikel |
131 |
Scalable non-deterministic clustering-based k-anonymization for rich networks
|
Ros-Martín, Miguel |
|
2018 |
|
2 |
p. 219-238 |
artikel |
132 |
SealFSv2: combining storage-based and ratcheting for tamper-evident logging
|
Guardiola-Múzquiz, Gorka |
|
|
|
2 |
p. 447-466 |
artikel |
133 |
Secure and efficient wildcard search over encrypted data
|
Chatterjee, Sanjit |
|
|
|
2 |
p. 199-244 |
artikel |
134 |
Security bug reports classification using fasttext
|
Alqahtani, Sultan S. |
|
|
|
2 |
p. 1347-1358 |
artikel |
135 |
Security in cloud computing
|
|
|
2014 |
|
2 |
p. 95-96 |
artikel |
136 |
Security issues in cloud environments: a survey
|
Fernandes, Diogo A. B. |
|
2013 |
|
2 |
p. 113-170 |
artikel |
137 |
Security policy verification for multi-domains in cloud systems
|
Gouglidis, Antonios |
|
2013 |
|
2 |
p. 97-111 |
artikel |
138 |
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
|
Nayak, Sanjeet Kumar |
|
|
|
2 |
p. 229-240 |
artikel |
139 |
Short collusion-secure fingerprint codes against three pirates
|
Nuida, Koji |
|
2012 |
|
2 |
p. 85-102 |
artikel |
140 |
SilentKnock: practical, provably undetectable authentication
|
Vasserman, Eugene Y. |
|
2008 |
|
2 |
p. 121-135 |
artikel |
141 |
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks
|
Ariyadasa, Subhash |
|
|
|
2 |
p. 1055-1076 |
artikel |
142 |
SonarSnoop: active acoustic side-channel attacks
|
Cheng, Peng |
|
|
|
2 |
p. 213-228 |
artikel |
143 |
Special issue on “SCADA and control system security”
|
|
|
2011 |
|
2 |
p. 135-136 |
artikel |
144 |
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013
|
Bella, Giampaolo |
|
2015 |
|
2 |
p. 101-102 |
artikel |
145 |
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext
|
Xu, Jia |
|
|
|
2 |
p. 141-159 |
artikel |
146 |
Structural analysis and detection of android botnets using machine learning techniques
|
Kirubavathi, G. |
|
2017 |
|
2 |
p. 153-167 |
artikel |
147 |
Studying lattice reduction algorithms improved by quick reordering technique
|
Wang, Yuntao |
|
|
|
2 |
p. 257-268 |
artikel |
148 |
The Agent Web Model: modeling web hacking for reinforcement learning
|
Erdődi, László |
|
|
|
2 |
p. 293-309 |
artikel |
149 |
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves
|
Hitchcock, Yvonne |
|
2004 |
|
2 |
p. 86-98 |
artikel |
150 |
Theory and benefits of recursive certificate structures
|
Russell, Selwyn |
|
2004 |
|
2 |
p. 78-90 |
artikel |
151 |
The principle of guarantee availability for security protocol analysis
|
Bella, Giampaolo |
|
2009 |
|
2 |
p. 83-97 |
artikel |
152 |
The rise of “security and privacy”: bibliometric analysis of computer privacy research
|
Ali, Auwal Shehu |
|
|
|
2 |
p. 863-885 |
artikel |
153 |
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
|
Nandanwar, Himanshu |
|
|
|
2 |
p. 1251-1277 |
artikel |
154 |
Topology-hiding garbled circuits without universal circuits
|
Zhang, Zheng |
|
|
|
2 |
p. 341-356 |
artikel |
155 |
Toward a blockchain-based framework for challenge-based collaborative intrusion detection
|
Li, Wenjuan |
|
|
|
2 |
p. 127-139 |
artikel |
156 |
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device
|
Gandhi, Kapilan Kulayan Arumugam |
|
|
|
2 |
p. 417-431 |
artikel |
157 |
Trends in publishing blockchain surveys: a bibliometric perspective
|
Ahmad, Hira |
|
|
|
2 |
p. 511-523 |
artikel |
158 |
Two-factor authentication for the Bitcoin protocol
|
Mann, Christopher |
|
2016 |
|
2 |
p. 213-226 |
artikel |
159 |
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
|
Ben Attia, Hasiba |
|
|
|
2 |
p. 163-187 |
artikel |
160 |
Using targeted Bayesian network learning for suspect identification in communication networks
|
Gruber, A. |
|
2017 |
|
2 |
p. 169-181 |
artikel |
161 |
Verifying multicast-based security protocols using the inductive method
|
Martina, Jean Everson |
|
2014 |
|
2 |
p. 187-204 |
artikel |
162 |
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
|
Hamdi, Ahlem |
|
|
|
2 |
p. 713-757 |
artikel |
163 |
Vulnerability discovery based on source code patch commit mining: a systematic literature review
|
Zuo, Fei |
|
|
|
2 |
p. 1513-1526 |
artikel |