Cs-Cr
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Compliance of POLYAS with the Common Criteria Protection Profile
Ubuntu One Investigation: Detecting Evidences on Client Machines
Physical Access Control Management System Based on Permissioned Blockchain
BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkish Public Organizations
EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement
Truxen: A Trusted Computing Enhanced Blockchain
Measuring the Correlation of Personal Identity Documents in Structured Format
A Blockchain-Based Architecture for Traffic Signal Control Systems
The Social and Psychological Impact of Cyber-Attacks
QKD in Standard Optical Telecommunications Networks
Hiding Information in Big Data based on Deep Learning
Probabilistic Smart Contracts: Secure Randomness on the Blockchain
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review
Fooling a Real Car with Adversarial Traffic Signs
A Secure Aggregation Protocol for Wireless Sensor Networks
Blockchain Applications in Power Systems: A Bibliometric Analysis
Generalized DC loop current attack against the KLJN secure key exchange scheme
BeCAPTCHA: Detecting Human Behavior in Smartphone Interaction using Multiple Inbuilt Sensors
Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change
Using Unit Testing to Detect Sanitization Flaws