Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A first look at references from the dark to the surface web world: a case study in Tor Zabihimayvan, Mahdieh

21 4 p. 739-755
article
2 A multi-objective cost–benefit optimization algorithm for network hardening Zenitani, Kengo

21 4 p. 813-832
article
3 A survey on analyzing encrypted network traffic of mobile devices Agrawal, Ankit

21 4 p. 873-915
article
4 A systematic literature review on wearable health data publishing under differential privacy Saifuzzaman, Munshi

21 4 p. 847-872
article
5 Challenges of post-quantum digital signing in real-world applications: a survey Tan, Teik Guan

21 4 p. 937-952
article
6 Coin-based Secure Computations Komano, Yuichi

21 4 p. 833-846
article
7 Developing non-interactive MPC with trusted hardware for enhanced security Karl, Ryan

21 4 p. 777-797
article
8 IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core Koike, Kazuki

21 4 p. 1-19
article
9 MAPAS: a practical deep learning-based android malware detection system Kim, Jinsung

21 4 p. 725-738
article
10 Scalable, password-based and threshold authentication for smart homes Huszti, Andrea

21 4 p. 707-723
article
11 Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains Zia, Unsub

21 4 p. 917-935
article
12 ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network Gong, Qian

21 4 p. 799-812
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands