Loading…
Evaluating image quality measures to assess the impact of lossy data compression applied to climate simulation data
Get full text
Journal Article
Conference Proceeding
Loading…
Measuring and visualizing cyber threat intelligence quality
Schlette, Daniel, Böhm, Fabian, Caselli, Marco, Pernul, Günther
Published in International journal of information security (01.02.2021)
Published in International journal of information security (01.02.2021)
Get full text
Journal Article
Loading…
Security issues in cloud environments: a survey
Fernandes, Diogo A. B., Soares, Liliana F. B., Gomes, João V., Freire, Mário M., Inácio, Pedro R. M.
Published in International journal of information security (01.04.2014)
Published in International journal of information security (01.04.2014)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Complete b-symbol weight distribution of some irreducible cyclic codes
Zhu, Hongwei, Shi, Minjia, Özbudak, Ferruh
Published in Designs, codes, and cryptography (01.05.2022)
Published in Designs, codes, and cryptography (01.05.2022)
Get full text
Journal Article
Loading…
Loading…
On Abelian one-dimensional hull codes in group algebras
Luo, Rong, Yan, Mingliang, Mesnager, Sihem, Han, Dongchun
Published in Designs, codes, and cryptography (01.12.2024)
Published in Designs, codes, and cryptography (01.12.2024)
Get full text
Journal Article
Loading…
Leakage-resilient identity-based cryptography from minimal assumptions
Zhou, Yanwei, Yang, Bo, Qiao, Zirui, Xia, Zhe, Zhang, Mingwu, Mu, Yi
Published in Designs, codes, and cryptography (01.11.2023)
Published in Designs, codes, and cryptography (01.11.2023)
Get full text
Journal Article
Loading…
Loading…
Survey on recent trends towards generalized differential and boomerang uniformities
Mesnager, Sihem, Mandal, Bimal, Msahli, Mounira
Published in Cryptography and communications (01.07.2022)
Published in Cryptography and communications (01.07.2022)
Get full text
Journal Article
Loading…
Loading…
Olympus: a GDPR compliant blockchain system
Gonçalves, Ricardo Martins, da Silva, Miguel Mira, da Cunha, Paulo Rupino
Published in International journal of information security (01.04.2024)
Published in International journal of information security (01.04.2024)
Get full text
Journal Article
Loading…
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Barredo, Jorge, Eceiza, Maialen, Flores, Jose Luis, Iturbe, Mikel
Published in International journal of information security (01.08.2025)
Published in International journal of information security (01.08.2025)
Get full text
Journal Article
Loading…
Stealing PINs via mobile sensors: actual risk versus user perception
Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F., Hao, Feng
Published in International journal of information security (01.06.2018)
Published in International journal of information security (01.06.2018)
Get full text
Journal Article
Loading…
Loading…
A risk and conformity assessment framework to ensure security and resilience of healthcare systems and medical supply chain
Kioskli, Kitty, Grigoriou, Elisavet, Islam, Shareeful, Yiorkas, Andrianos M., Christofi, Loizos, Mouratidis, Haralambos
Published in International journal of information security (01.04.2025)
Published in International journal of information security (01.04.2025)
Get full text
Journal Article
Loading…
Using permutation rational functions to obtain permutation arrays with large hamming distance
Bereg, Sergey, Malouf, Brian, Morales, Linda, Stanley, Thomas, Sudborough, I. Hal
Published in Designs, codes, and cryptography (01.07.2022)
Published in Designs, codes, and cryptography (01.07.2022)
Get full text
Journal Article