Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
·
How to upload
Include full text
Search results
Back
Searched for: %2520
(1 - 20 of 36)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
Privacy-Preserving and Security in SDN-based IoT: A Survey
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
Secure Logistic Regression for Vertical Federated Learning
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
Impact of Network Topology on the Resilience of Vehicle Platoons
Blockchain: What Does It Mean to Industrial Electronics?: Technologies, Challenges, and Opportunities
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Searched for: %2520
(1 - 20 of 36)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel