(1 - 20 of 36)

Pages

A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
A Control Method for Converter-interfaced Sources to Improve Operation of Directional Protection Elements
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Privacy-Preserving and Security in SDN-based IoT
Privacy-Preserving and Security in SDN-based IoT: A Survey
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
Pushing boundaries
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
FABRIC
FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
A Bayesian-network approach for assessing the probability of success of physical security attacks to offshore Oil&Gas facilities
Astraea
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
Secure Logistic Regression for Vertical Federated Learning
Secure Logistic Regression for Vertical Federated Learning
Impact of Network Topology on the Resilience of Vehicle Platoons
Impact of Network Topology on the Resilience of Vehicle Platoons
Blockchain
Blockchain: What Does It Mean to Industrial Electronics?: Technologies, Challenges, and Opportunities
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
Transition to Digitalized Paradigms for Security Control and Decentralized Electricity Market
SETCAP
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Biases in security risk management: Do security professionals follow prospect theory in their decisions?
Nudging as a crime prevention strategy
Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
Identifying common grounds for safety and security research: a comparative scientometric analysis focusing on development patterns, similarities, and differences
The ethical application of biometric facial recognition technology
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
(1 - 20 of 36)

Pages