Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Cyber security in the Smart Grid: Survey and challengesWang, Wenye ; Lu, ZhuoComputer networks (Amsterdam, Netherlands : 1999), 2013-04, Vol.57 (5), p.1344-1371 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
2 |
Material Type: Artigo
|
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computingDong, Xin ; Yu, Jiadi ; Luo, Yuan ; Chen, Yingying ; Xue, Guangtao ; Li, MingluComputers & security, 2014-05, Vol.42, p.151-164 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
3 |
Material Type: Artigo
|
Shadow IT – A view from behind the curtainSilic, Mario ; Back, AndreaComputers & security, 2014-09, Vol.45, p.274-283 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
4 |
Material Type: Artigo
|
Attribute-Based Encryption With Verifiable Outsourced DecryptionJunzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian WengIEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
5 |
Material Type: Artigo
|
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cardsMishra, Dheerendra ; Das, Ashok Kumar ; Mukhopadhyay, SouravExpert systems with applications, 2014-12, Vol.41 (18), p.8129-8143 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
6 |
Material Type: Artigo
|
Reversible Data Hiding in Encrypted Images by Reserving Room Before EncryptionMa, Kede ; Weiming Zhang ; Xianfeng Zhao ; Nenghai Yu ; Fenghua LiIEEE transactions on information forensics and security, 2013-03, Vol.8 (3), p.553-562 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
7 |
Material Type: Artigo
|
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notionTurkanović, Muhamed ; Brumen, Boštjan ; Hölbl, MarkoAd hoc networks, 2014-09, Vol.20, p.96-112 [Periódico revisado por pares]Oxford: Elsevier B.VTexto completo disponível |
|
8 |
Material Type: Artigo
|
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometricsChuang, Ming-Chin ; Chen, Meng ChangExpert systems with applications, 2014-03, Vol.41 (4), p.1411-1418 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
9 |
Material Type: Artigo
|
On the (im)possibility of obfuscating programsBarak, Boaz ; Goldreich, Oded ; Impagliazzo, Russell ; Rudich, Steven ; Sahai, Amit ; Vadhan, Salil ; Yang, KeJournal of the ACM, 2012-04, Vol.59 (2), p.1-48 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
|
10 |
Material Type: Artigo
|
Implementing a database encryption solution, design and implementation issuesShmueli, Erez ; Vaisenberg, Ronen ; Gudes, Ehud ; Elovici, YuvalComputers & security, 2014-07, Vol.44, p.33-50 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |