Linked e-resources

Details

Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
Untangling the XRP Ledger: Insights and Analysis
End To End Autorship Email Verification Framework for a Secure Communication
Symmetric and Asymmetric Schemes for Lightweight Secure Communication
Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft
Key Agreement in the Lightning Network Protocol
Effects of Explanatory Information on Privacy Policy Summarization Tool Perception
Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments
Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies
Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.

Browse Subjects

Show more subjects...

Statistics

from
to
Export