- Implementing generic security requirements in e-voting using modified stegano-cryptographic approach
- Performance analysis of buffered crossbar switch scheduling algorithms
- Advanced security analysis of a signature scheme with message recovery
- Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes
- Mobile device security
23 March 2016
Free sample articles newly available from the International Journal of Information and Computer Security
The following sample articles from the International Journal of Information and Computer Security are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment