Cs-Cr
Blockchain Applications in Power Systems: A Bibliometric Analysis
Generalized DC loop current attack against the KLJN secure key exchange scheme
BeCAPTCHA: Detecting Human Behavior in Smartphone Interaction using Multiple Inbuilt Sensors
Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change
Using Unit Testing to Detect Sanitization Flaws
An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
Characterizing Internet Worm Infection Structure
On Secure Workflow Decentralisation on the Internet
SPB: A Secure Private Blockchain-based Solution for Energy Trading
Fog Computing Systems: State of the Art, Research Issues and Future Trends, with a Focus on Resilience
Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems
Video Encryption: A Survey
Profile-Based Ad Hoc Social Networking Using Wi-Fi Direct on the Top of Android
Contribution of Herv{e} Suaudeau for the mission of the French Senate Law Commission on electronic voting on 25 January 2018
An attack on MySQLs login protocol
Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations
Neural Network based classification of bone metastasis by primary cacinoma
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge
A Parallel Encryption Algorithm for Block Ciphers Based on Reversible Programmable Cellular Automata