skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Cyber security in the Smart Grid: Survey and challenges
Material Type:
Artigo
Adicionar ao Meu Espaço

Cyber security in the Smart Grid: Survey and challenges

Wang, Wenye ; Lu, Zhuo

Computer networks (Amsterdam, Netherlands : 1999), 2013-04, Vol.57 (5), p.1344-1371 [Periódico revisado por pares]

Kidlington: Elsevier B.V

Texto completo disponível

2
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing

Dong, Xin ; Yu, Jiadi ; Luo, Yuan ; Chen, Yingying ; Xue, Guangtao ; Li, Minglu

Computers & security, 2014-05, Vol.42, p.151-164 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

3
Shadow IT – A view from behind the curtain
Material Type:
Artigo
Adicionar ao Meu Espaço

Shadow IT – A view from behind the curtain

Silic, Mario ; Back, Andrea

Computers & security, 2014-09, Vol.45, p.274-283 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

4
Attribute-Based Encryption With Verifiable Outsourced Decryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian Weng

IEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

5
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
Material Type:
Artigo
Adicionar ao Meu Espaço

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

Mishra, Dheerendra ; Das, Ashok Kumar ; Mukhopadhyay, Sourav

Expert systems with applications, 2014-12, Vol.41 (18), p.8129-8143 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

6
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

Ma, Kede ; Weiming Zhang ; Xianfeng Zhao ; Nenghai Yu ; Fenghua Li

IEEE transactions on information forensics and security, 2013-03, Vol.8 (3), p.553-562 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

7
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Material Type:
Artigo
Adicionar ao Meu Espaço

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

Turkanović, Muhamed ; Brumen, Boštjan ; Hölbl, Marko

Ad hoc networks, 2014-09, Vol.20, p.96-112 [Periódico revisado por pares]

Oxford: Elsevier B.V

Texto completo disponível

8
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
Material Type:
Artigo
Adicionar ao Meu Espaço

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

Chuang, Ming-Chin ; Chen, Meng Chang

Expert systems with applications, 2014-03, Vol.41 (4), p.1411-1418 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

9
On the (im)possibility of obfuscating programs
Material Type:
Artigo
Adicionar ao Meu Espaço

On the (im)possibility of obfuscating programs

Barak, Boaz ; Goldreich, Oded ; Impagliazzo, Russell ; Rudich, Steven ; Sahai, Amit ; Vadhan, Salil ; Yang, Ke

Journal of the ACM, 2012-04, Vol.59 (2), p.1-48 [Periódico revisado por pares]

New York, NY: ACM

Texto completo disponível

10
Implementing a database encryption solution, design and implementation issues
Material Type:
Artigo
Adicionar ao Meu Espaço

Implementing a database encryption solution, design and implementation issues

Shmueli, Erez ; Vaisenberg, Ronen ; Gudes, Ehud ; Elovici, Yuval

Computers & security, 2014-07, Vol.44, p.33-50 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (1.350)
  2. Revistas revisadas por pares (2.282)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (974)
  2. Anais de Congresso  (878)
  3. Book Chapters  (545)
  4. magazinearticle  (11)
  5. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1999  (11)
  2. 1999Até2002  (18)
  3. 2003Até2005  (1.092)
  4. 2006Até2009  (508)
  5. Após 2009  (780)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.