nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Digital Asset Inheritance Model to Convey Online Persona Posthumously
|
Singh, Ram Govind |
|
|
21 |
5 |
p. 983-1003 |
artikel |
2 |
Algorithm substitution attacks against receivers
|
Armour, Marcel |
|
|
21 |
5 |
p. 1027-1050 |
artikel |
3 |
An anonymous and unlinkable electronic toll collection system
|
Borges, Ricard |
|
|
21 |
5 |
p. 1151-1162 |
artikel |
4 |
ANS-based compression and encryption with 128-bit security
|
Camtepe, Seyit |
|
|
21 |
5 |
p. 1051-1067 |
artikel |
5 |
A survey on interest packet flooding attacks and its countermeasures in named data networking
|
Jeet, Rabari |
|
|
21 |
5 |
p. 1163-1187 |
artikel |
6 |
BitCracker: BitLocker meets GPUs
|
Agostini, E. |
|
|
21 |
5 |
p. 1005-1018 |
artikel |
7 |
Classifying resilience approaches for protecting smart grids against cyber threats
|
Syrmakesis, Andrew D. |
|
|
21 |
5 |
p. 1189-1210 |
artikel |
8 |
Efficient verifiable computation over quotient polynomial rings
|
Park, Jai Hyun |
|
|
21 |
5 |
p. 953-971 |
artikel |
9 |
Highly private blockchain-based management system for digital COVID-19 certificates
|
Pericàs-Gornals, Rosa |
|
|
21 |
5 |
p. 1069-1090 |
artikel |
10 |
IntentAuth: Securing Android’s Intent-based inter-process communication
|
Lyvas, Christos |
|
|
21 |
5 |
p. 973-982 |
artikel |
11 |
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
|
Cevik, Beyza |
|
|
21 |
5 |
p. 1107-1125 |
artikel |
12 |
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”
|
Ahmim, Ilyes |
|
|
21 |
5 |
p. 1019-1026 |
artikel |
13 |
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats
|
Vlachos, Vasileios |
|
|
21 |
5 |
p. 1091-1106 |
artikel |
14 |
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls
|
Inayoshi, Hiroki |
|
|
21 |
5 |
p. 1127-1149 |
artikel |