Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Security and Privacy Services
On Secrecy Amplification Protocols
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
Private Minutia-based Fingerprint Matching
Secure Resource Sharing and Access Control
Secure Resource Sharing for Embedded Protected Module Architectures
Secure Obfuscation of Authoring Style
DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
WSACd
A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment
Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
Practical and Privacy-Preserving TEE Migration
Randomizing the Montgomery Powering Ladder
Challenges of Security and Reliability
How Current Android Malware Seeks to Evade Automated Code Analysis
On linkability and malleability in self-blindable credentials
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Short Papers
Normalizing Security Events with a Hierarchical Knowledge Base
Attack Tree Generation by Policy Invalidation
Lightweight Password Hashing Scheme for Embedded Systems
Secure and Authenticated Access to LLN Resources Through Policy Constraints.

Browse Subjects

Show more subjects...

Statistics

from
to
Export