Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             6 results found
no title author magazine year volume issue page(s) type
1 Efficient and verifiable algorithms for secure outsourcing of cryptographic computations Kiraz, Mehmet Sabır
2015
15 5 p. 519-537
article
2 Efficient wildcard search over encrypted data Hu, Changhui
2015
15 5 p. 539-547
article
3 If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts Almaatouq, Abdullah
2016
15 5 p. 475-491
article
4 New facets of mobile botnet: architecture and evaluation Anagnostopoulos, Marios
2015
15 5 p. 455-473
article
5 Private and oblivious set and multiset operations Blanton, Marina
2015
15 5 p. 493-518
article
6 Time-specific encryption from forward-secure encryption: generic and direct constructions Kasamatsu, Kohei
2015
15 5 p. 549-571
article
                             6 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands