Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1721
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
1722
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…IET Information Security…”
Get full text
Article -
1723
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
1724
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1725
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1726
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1727
Hot and cold exposure triggers distinct transcriptional and behavioral responses in laboratory-inbred pond snails
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1728
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1729
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
1730
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1731
Effects of sub-monthly and sub-daily water level variations on water level fluctuation requirements of Phragmites australis and Phalaris arundinacea
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1732
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
1733
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1734
Further constructions of bent functions and their duals
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
1735
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1736
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1737
Understanding the mechanisms of hypoxia-induced tissue damage in fish: The role of GasderminEa/b in Larimichthys crocea
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1738
Evaluation of the influence of offshore wind farm noise on the fishes and dolphins in the Pearl River Estuary
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1739
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
1740
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article