Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Malware and attacks
Persistence in Linux-Based IoT Malware
Real-time triggering of Android memory dumps for stealthy attack investigation
Using Features of Encrypted Network Traffic to Detect Malware
Formal analysis
Machine-checking the universal verifiability of ElectionGuard
Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Applied cryptography
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
TLV-to-MUC Express: Post-quantum MACsec in VXLAN
On the Certi cate Revocation Problem in the Maritime Sector
Security mechanisms and training
HoneyHash: Honeyword Generation Based on Transformed Hashes
Agent-based File Extraction Using Virtual Machine Introspection
Cyber range automation overview with a case study of CRATE
Applications and privacy
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
OnLITE: On-line Label for IoT Transparency Enhancement
An Investigation of Comic-Based Permission Requests.

Browse Subjects

Show more subjects...

Statistics

from
to
Export