Digital Library
Close
Browse articles from a journal
Search for
Magazine
Article
ISSN
NBN article
NBN magazine
DARE/NARCIS document
with title:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal description
All volumes of the corresponding journal
All issues of the corresponding volume
All articles of the corresponding issues
6 results found
no
title
author
magazine
year
volume
issue
page(s)
type
1
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
Kiraz, Mehmet Sabır
2015
15
5
p. 519-537
article
2
Efficient wildcard search over encrypted data
Hu, Changhui
2015
15
5
p. 539-547
article
3
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
Almaatouq, Abdullah
2016
15
5
p. 475-491
article
4
New facets of mobile botnet: architecture and evaluation
Anagnostopoulos, Marios
2015
15
5
p. 455-473
article
5
Private and oblivious set and multiset operations
Blanton, Marina
2015
15
5
p. 493-518
article
6
Time-specific encryption from forward-secure encryption: generic and direct constructions
Kasamatsu, Kohei
2015
15
5
p. 549-571
article
6 results found
Koninklijke Bibliotheek -
National Library of the Netherlands