Showing 144 - 156 of 226
View by: Cover Page List Articles
-
Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls
published 13 Dec 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
published 12 Dec 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
published 12 Dec 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A short certificateless aggregate signature against coalition attacks
published 12 Dec 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Enhancing the robustness of recommender systems against spammers
published 01 Nov 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
It’s the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling
published 26 Oct 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
published 09 Oct 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps
published 05 Oct 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Detection of slow port scans in flow-based network traffic
published 25 Sep 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network
published 06 Sep 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data
published 06 Sep 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Evolutionary dynamics of cryptocurrency transaction networks: An empirical study
published 17 Aug 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositions
published 25 Jul 2018
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us