-
121
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: Get full text
Article -
122
Survey of key management schemes for cluster networks
Published 2022-12-01Subjects: Get full text
Article -
123
Parameter selection of autocorrelation test for block ciphers
Published 2009-01-01Subjects: “…information security…”
Get full text
Article -
124
Research on vulnerability and security technology of industrial Ethernet protocol
Published 2017-11-01Subjects: Get full text
Article -
125
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Published 2025-01-01Subjects: Get full text
Article -
126
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01Subjects: Get full text
Article -
127
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01Subjects: “…information security…”
Get full text
Article -
128
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
129
Multi-keyword partial matching algorithm based on text fragments
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
130
Problems and prospects of the Russian Federation customs authorities digitalisation
Published 2022-11-01Subjects: Get full text
Article -
131
A survey of V2X security protection technologies
Published 2023-03-01Subjects: Get full text
Article -
132
Correlation-immunity study of balanced H-Boolean functions
Published 2013-08-01Subjects: Get full text
Article -
133
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01Subjects: Get full text
Article -
134
Translation of Value-Semantic Narratives in Public Digital Communication: Opportunities and Limitations
Published 2024-12-01Subjects: Get full text
Article -
135
Comparison and Analysis of Matching patterns using Simulation with Subsurface Navigation Approach Based on Magnetic Maps
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
136
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
Published 2022-01-01Subjects: Get full text
Article -
137
Behavior authentication of Web users based on machine learning
Published 2018-01-01Subjects: “…information security…”
Get full text
Article -
138
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01Subjects: Get full text
Article -
139
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
Published 2017-02-01Subjects: Get full text
Article -
140
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: Get full text
Article