-
1
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
2
-
3
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
4
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
5
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: “…date and computer security…”
Get full text
Article -
6
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
7
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
8
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
9
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
10
Research on continuous monitoring of cloud computing service
Published 2016-10-01Subjects: Get full text
Article -
11
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01Subjects: Get full text
Article -
12
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
13
-
14
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01Subjects: “…cloud computing security…”
Get full text
Article -
15
Survey on the privacy-preserving content based image retrieval
Published 2019-08-01Subjects: Get full text
Article -
16
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article