Linked e-resources

Details

Access Control
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
Secure Protocol of ABAC Certificates Revocation and Delegation
Formal Verification
Formal Analysis of Combinations of Secure Protocols
Formal Analysis of the Fido 1.x Protocol
Position Paper: A Roadmap for High Assurance Cryptography
Privacy
Privacy-preserving Equality Test towards Big Data
Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy
Physical Security
Generation of Applicative Attacks Scenarios Against Industrial Systems
HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment
Monitoring of Security Properties Using BeepBeep
Network Security, Encrypted DBs and Blockchain
More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage
Ethereum: state of knowledge and research perspectives
Vulnerability Analysis and Deception Systems
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Extinguishing Ransomware
a Hybrid Approach to Android Ransomware Detection
Deception in Information Security: Legal Considerations in the Context of German and European Law
Defence Against Attacks and Anonymity
SATYA: Defending against Adversarial Attacks using Statistical Hypothesis Testing
Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric
Weighted Factors for Evaluating Anonymity.

Browse Subjects

Show more subjects...

Statistics

from
to
Export