Linked e-resources

Details

Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics
ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks
User Relationship Classication of Facebook Messenger Mobile Data using WEKA
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain
Real-time IoT Device Activity Detection in Edge Networks
Analysis on the Block Reward of Fork After Withholding
DBAF: Dynamic Binary Analysis Framework and Its Applications
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control
Preventing Buffer Overflows by Context-aware Failure-oblivious Computing
Analyzing the Communication Security between Smartphones and IoT based on CORAS
^An efficient privacy preserving batch authentication scheme with deterable function for VANETs
Using Software Visualization for Supporting the Teaching of Map Reduce
Walking on the Cloud: Gait Recognition, a Wearable Solution
Anonymous Attribute-Based Conditional Proxy Re-Encryption
Burn After Reading: Expunging Execution Footprints of Android Apps
Comprehensive Analysis of the Permissions used in Android
A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search
An OpenvSwitch Extension for SDN Traceback
Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs
Creating and Managing Realism in the Next-Generation Cyber Range
^Deep Android Malware Detection with Adaptive Classifier Selection
Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices
Understanding the Behaviors of BGP-based DDoS Protection Services
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture
Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke
LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices
Android Malware Detection Methods Based on the Combination of Clustering and Classification
Secure Semantic Search based on Two-level Index over Encrypted Cloud
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.

Browse Subjects

Show more subjects...

Statistics

from
to
Export