Linked e-resources

Details

An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems
Security and Complexity of a New Variant of the McEliece Cryptosystem using Non-linear Convolutional Codes
A Secure Distributed Hash-Based Encryption suited for Big Data Systems
An Assurance Framework and Process for Hybrid Systems
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE
Practically Efficient Attribute-based Encryption for Compartmented and Multilevel Access Structures
Analysis of In-place Randomized Bit-flipping Decoders for the Design of LDPC and MDPC Code-based Cryptosystems
Business Analyst Tasks for Requirement Elicitation
Chained Transaction Protocol Automated Verification using Cl-AtSe
Overall Feasibility of RF Energy Harvesting for IoT.

Browse Subjects

Show more subjects...

Statistics

from
to
Export