Loading…
Loading…
Loading…
Loading…
Loading…
Güven: estimating trust from communications
Kalia, Anup K., Zhang, Zhe, Singh, Munindar P.
Published in Journal of trust management (05.01.2016)
Published in Journal of trust management (05.01.2016)
Get full text
Journal Article
Loading…
Combinatorial constructions for optimal 2-D optical orthogonal codes with AM-OPPTS property
Dai, Peipei, Wang, Jianmin, Yin, Jianxing
Published in Designs, codes, and cryptography (01.05.2014)
Published in Designs, codes, and cryptography (01.05.2014)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
Year of Publication 2016
Get full text
Conference Proceeding
Loading…
Topics in Cryptology –- CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
Year of Publication 2015
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Data remanence effects on memory-based entropy collection for RFID systems
Saxena, Nitesh, Voris, Jonathan
Published in International journal of information security (01.08.2011)
Published in International journal of information security (01.08.2011)
Get full text
Journal Article
Loading…
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage
D’Arco, Paolo, Perez del Pozo, Angel
Published in International journal of information security (01.02.2013)
Published in International journal of information security (01.02.2013)
Get full text
Journal Article
Conference Proceeding
Loading…
Concrete- and abstract-based access control
Bouzida, Yacine, Logrippo, Luigi, Mankovski, Serge
Published in International journal of information security (01.08.2011)
Published in International journal of information security (01.08.2011)
Get full text
Journal Article
Loading…