Searched for: %2520
(1 - 20 of 36)

Pages

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
Pushing boundaries
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
FABRIC
FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing
Astraea
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
Privacy-Preserving and Security in SDN-based IoT
Privacy-Preserving and Security in SDN-based IoT: A Survey
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
Secure Logistic Regression for Vertical Federated Learning
Secure Logistic Regression for Vertical Federated Learning
SETCAP
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
Impact of Network Topology on the Resilience of Vehicle Platoons
Impact of Network Topology on the Resilience of Vehicle Platoons
Blockchain
Blockchain: What Does It Mean to Industrial Electronics?: Technologies, Challenges, and Opportunities
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
The ethical application of biometric facial recognition technology
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Bayesian network model to distinguish between intentional attacks and accidental technical failures
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Searched for: %2520
(1 - 20 of 36)

Pages