- Thresholding attack on the BSS-based cryptosystem which has binary key
- Identity-based threshold ring signcryption from pairing
- Vulnerability considerations for power line communication's supervisory control and data acquisition
- Vehicular ad hoc network applications and security: a study into the economic and the legal implications
- A security enhanced password authentication and update scheme based on elliptic curve cryptography
- Multi-carrier coded division multiple access multiplexing against multi-path fading
- The biometric landscape - towards a sustainable biometric terminology framework
6 July 2014
Themed issue: "Systems Security, Safety and Sustainability"
International Journal of Electronic Security and Digital Forensics 6(2) 2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment