Showing 92 - 104 of 228
View by: Cover Page List Articles
-
Analysing potential data security losses in organisations based on subsequent users logins
published 24 Aug 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing
published 23 Jun 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
A novel privacy-preserving biometric authentication scheme
published 25 May 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
P/Key: PUF based second factor authentication
published 09 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Information sharing and deferral option in cybersecurity investment
published 06 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Multi-party co-signature scheme based on SM2
published 06 Feb 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Domain generation algorithms detection with feature extraction and Domain Center construction
published 27 Jan 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
A security testing mechanism for detecting attacks in distributed software applications using blockchain
published 20 Jan 2023
Loading metrics information...
Metrics unavailable. Please check back later.
-
Population processes in cyber system variability
published 27 Dec 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Android malware detection method based on highly distinguishable static features and DenseNet
published 23 Nov 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Computer cyberspace security mechanism supported by cloud computing
published 07 Oct 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps
published 16 Sep 2022
Loading metrics information...
Metrics unavailable. Please check back later.
-
MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model
published 15 Sep 2022
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us