Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Livro
|
![]() |
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. ProceedingsRanise, Silvio ; Swarup, Vipin Ranise, Silvio ; Swarup, Vipin ; Swarup, Vipin ; Ranise, SilvioNetherlands: Springer Nature 2016Texto completo disponível |
2 |
Material Type: Livro
|
![]() |
Data and applications security and privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. ProceedingsRanise, Silvio ; Swarup, VipinSpringer 2016Texto completo disponível |
3 |
Material Type: Artigo
|
![]() |
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURFWangen, Gaute ; Hallstensen, Christoffer ; Snekkenes, EinarInternational journal of information security, 2018-11, Vol.17 (6), p.681-699 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Cryptanalysis of MORUSLi, Yanbin ; Wang, MeiqinDesigns, codes, and cryptography, 2019-05, Vol.87 (5), p.1035-1058 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
A comprehensive review on permissions-based Android malware detectionSharma, Yash ; Arora, AnshulInternational journal of information security, 2024-06, Vol.23 (3), p.1877-1912 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applicationsDeepa, G. ; Thilagam, P. Santhi ; Khan, Furqan Ahmed ; Praseed, Amit ; Pais, Alwyn R. ; Palsetia, NushafreenInternational journal of information security, 2018-02, Vol.17 (1), p.105-120 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Variants of Wegman-Carter message authentication code supporting variable tag lengthsGhosh, Sebati ; Sarkar, PalashDesigns, codes, and cryptography, 2021-04, Vol.89 (4), p.709-736 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Linking socially contributed media with eventsLiu, Xueliang ; Huet, BenoitMultimedia systems, 2016-07, Vol.22 (4), p.433-442 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Formally proved security of assembly code against power analysis: A case study on balanced logicRauzy, Pablo ; Guilley, Sylvain ; Najm, ZakariaJournal of cryptographic engineering, 2016-09, Vol.6 (3), p.201-216 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Dual-path temporal map optimization for make-up temporal video groundingLi, Jiaxiu ; Li, Kun ; Li, Jia ; Chen, Guoliang ; Wang, Meng ; Guo, DanMultimedia systems, 2024-06, Vol.30 (3), Article 140 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |