Search
Item hits:
Date | Title | Author(s) | 1-Mar-2011 | Social-based trustworthy data forwarding in vehicular delay tolerant networks | Alganas, Abdulelah |
1-Mar-2011 | Secure and compromise-resilient architecture for advanced metering infrastructure | Alfaheid, Khalid |
2016 | A framework for privacy-preserving data sharing in smart grid | Alharbi, Khalid |
1-Aug-2018 | Secure and privacy-preserving fog-assisted vehicular crowdsensing | Basudan, Sultan |
1-Jan-2020 | Design of a secure privacy preserving cloud based framework for sharing electronic health data | Ilokah, Munachiso |
1-Dec-2019 | An anomaly detection model utilizing attributes of low powered networks, IEEE 802.15.4e/TSCH and machine learning methods | Salgadoe, Sajeeva |
1-Aug-2013 | An investigation of semantic patterns in passwords | Veras Guimaraes, Rafael |
1-Mar-2013 | Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt | Garcia, Ricardo Rodriguez |
1-Sep-2015 | Determining the effectiveness of nuclear security through computer simulation | Chornoboy, Nicholas Jordan |
1-Apr-2016 | Claims-aware middleware for securing IoT services | George, Vathalloor Merin |
|