Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL AttackIslam, SK HafizulWireless personal communications, 2014-12, Vol.79 (3), p.1975-1991 [Periódico revisado por pares]Boston: Springer USTexto completo disponível |
|
2 |
Material Type: Artigo
|
Cyber security in the Smart Grid: Survey and challengesWang, Wenye ; Lu, ZhuoComputer networks (Amsterdam, Netherlands : 1999), 2013-04, Vol.57 (5), p.1344-1371 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
Game theory meets network security and privacyManshaei, Mohammad ; Zhu, Quanyan ; Alpcan, Tansu ; Bacşar, Tamer ; Hubaux, Jean-PierreACM computing surveys, 2013-06, Vol.45 (3), p.1-39 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
|
4 |
Material Type: Artigo
|
Security Challenges for the Public CloudRen, Kui ; Wang, Cong ; Wang, QianIEEE internet computing, 2012-01, Vol.16 (1), p.69-73 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
5 |
Material Type: Artigo
|
A formalization of card-based cryptographic protocols via abstract machineMizuki, Takaaki ; Shizuya, HirokiInternational journal of information security, 2014-02, Vol.13 (1), p.15-23 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
6 |
Material Type: Artigo
|
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notionTurkanović, Muhamed ; Brumen, Boštjan ; Hölbl, MarkoAd hoc networks, 2014-09, Vol.20, p.96-112 [Periódico revisado por pares]Oxford: Elsevier B.VTexto completo disponível |
|
7 |
Material Type: Artigo
|
On lattices, learning with errors, random linear codes, and cryptographyRegev, OdedJournal of the ACM, 2009-09, Vol.56 (6), p.1-40 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
|
8 |
Material Type: Ata de Congresso
|
On the Security of Certificateless Signature Schemes from Asiacrypt 2003Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, FutaiCryptology and Network Security, 2005, p.13-25 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergSem texto completo |
|
9 |
Material Type: Artigo
|
Reversible Data Hiding in Encrypted Images by Reserving Room Before EncryptionMa, Kede ; Weiming Zhang ; Xianfeng Zhao ; Nenghai Yu ; Fenghua LiIEEE transactions on information forensics and security, 2013-03, Vol.8 (3), p.553-562 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
10 |
Material Type: Artigo
|
Attribute-Based Encryption With Verifiable Outsourced DecryptionJunzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian WengIEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |