-
181
-
182
-
183
DIGITAL CULTURE – A HISTORICAL STAGE IN THE DEVELOPMENT OF THE INFORMATION CULTURE OF SOCIETY
Published 2020-07-01Subjects: Get full text
Article -
184
The European Union Cybersecurity Policy: Operationalization of the Resilience Concept
Published 2020-11-01Subjects: “…european union agency for network and information security…”
Get full text
Article -
185
Data protection impact assessment system in the mode of risk management
Published 2018-08-01Subjects: Get full text
Article -
186
Model of Reconfigurable Steganographic System Using Blockchain Technology
Published 2019-11-01Subjects: Get full text
Article -
187
-
188
Conceptual Approaches to the Problem of national Security Concept
Published 2021-03-01Subjects: Get full text
Article -
189
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
190
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
191
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
192
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
193
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
194
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
195
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
196
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
197
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
198
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
199
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…IET Information Security…”
Get full text
Article -
200
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…IET Information Security…”
Get full text
Article