-
181
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
182
-
183
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
184
Novel techniques for efficient PAPR reduction in NOMA systems for future wireless networks
Published 2025-01-01“…Journal of Information and Telecommunication…”
Get full text
Article -
185
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
186
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
187
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
188
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
189
Scalable temporal multiplexing of telecom photons via thin-film lithium niobate photonics
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
190
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
191
Noise-agnostic quantum error mitigation with data augmented neural models
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
192
Verification of a resetting protocol for an uncontrolled superconducting qubit
Published 2020-12-01“…npj Quantum Information…”
Get full text
Article -
193
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
194
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
195
Computer Security Lab Manual /
Published 2006“…Information assurance & security series…”
View in OPAC
Book -
196
Records Classification : concepts, principles and methods : information, systems, context /
Published 2017“…Chandos Information Professional Series.…”
View in OPAC
Book -
197
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
198
Number Theory in Science and Communication : with applications in cryptography, physics, digital information, computing, and self-similarity /
Published 1986“…Springer Series in Information Sciences.…”
View in OPAC
Book -
199
Deep learning detects entire multiple-size lunar craters driven by elevation data and topographic knowledge
Published 2025-01-01“…Geo-spatial Information Science…”
Get full text
Article -
200
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01“…EURASIP Journal on Information Security…”
Get full text
Article