A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks
(Login to Download)
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain
(Login to Download)
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
(Login to Download)
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
(Login to Download)
A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice
(Login to Download)
Authoritative and Unbiased Responses to Geographic Queries
(Login to Download)
Blockchain Based Redistricting with Public Participation
(Login to Download)
On the LWE Cryptosystem with More General Disturbance
(Login to Download)
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Login to Download)
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Login to Download)
Cybersecurity: Identifying the Vulnerability Intensity Function (VIF) and Vulnerability Index Indicator (VII) of a Computer Operating System
(Login to Download)
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
(Login to Download)
Hybrid Successive CFA Image Encryption-Watermarking Algorithm Based on the Quaternionic Wavelet Transform (QWT)
(Login to Download)
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Login to Download)
Low-Density Parity-Check Codes: Research Status and Development Direction
(Login to Download)
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Login to Download)
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Login to Download)
The Role of Social Engineering in Cybersecurity and Its Impact
(Login to Download)