Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
Include full text
Search results
Back
(1 - 20 of 36)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel
A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Privacy-Preserving and Security in SDN-based IoT: A Survey
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
Secure Logistic Regression for Vertical Federated Learning
Impact of Network Topology on the Resilience of Vehicle Platoons
Blockchain: What Does It Mean to Industrial Electronics?: Technologies, Challenges, and Opportunities
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
(1 - 20 of 36)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel