skip to main content
Mostrar Somente
Refinado por: xxx: xxx remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings

Ranise, Silvio ; Swarup, Vipin Ranise, Silvio ; Swarup, Vipin ; Swarup, Vipin ; Ranise, Silvio

Netherlands: Springer Nature 2016

Texto completo disponível

2
Data and applications security and privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Data and applications security and privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings

Ranise, Silvio ; Swarup, Vipin

Springer 2016

Texto completo disponível

3
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF
Material Type:
Artigo
Adicionar ao Meu Espaço

A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF

Wangen, Gaute ; Hallstensen, Christoffer ; Snekkenes, Einar

International journal of information security, 2018-11, Vol.17 (6), p.681-699 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

4
Cryptanalysis of MORUS
Material Type:
Artigo
Adicionar ao Meu Espaço

Cryptanalysis of MORUS

Li, Yanbin ; Wang, Meiqin

Designs, codes, and cryptography, 2019-05, Vol.87 (5), p.1035-1058 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

5
A comprehensive review on permissions-based Android malware detection
Material Type:
Artigo
Adicionar ao Meu Espaço

A comprehensive review on permissions-based Android malware detection

Sharma, Yash ; Arora, Anshul

International journal of information security, 2024-06, Vol.23 (3), p.1877-1912 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

6
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications

Deepa, G. ; Thilagam, P. Santhi ; Khan, Furqan Ahmed ; Praseed, Amit ; Pais, Alwyn R. ; Palsetia, Nushafreen

International journal of information security, 2018-02, Vol.17 (1), p.105-120 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

7
Variants of Wegman-Carter message authentication code supporting variable tag lengths
Material Type:
Artigo
Adicionar ao Meu Espaço

Variants of Wegman-Carter message authentication code supporting variable tag lengths

Ghosh, Sebati ; Sarkar, Palash

Designs, codes, and cryptography, 2021-04, Vol.89 (4), p.709-736 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

8
Linking socially contributed media with events
Material Type:
Artigo
Adicionar ao Meu Espaço

Linking socially contributed media with events

Liu, Xueliang ; Huet, Benoit

Multimedia systems, 2016-07, Vol.22 (4), p.433-442 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

9
Formally proved security of assembly code against power analysis: A case study on balanced logic
Material Type:
Artigo
Adicionar ao Meu Espaço

Formally proved security of assembly code against power analysis: A case study on balanced logic

Rauzy, Pablo ; Guilley, Sylvain ; Najm, Zakaria

Journal of cryptographic engineering, 2016-09, Vol.6 (3), p.201-216 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

10
Dual-path temporal map optimization for make-up temporal video grounding
Material Type:
Artigo
Adicionar ao Meu Espaço

Dual-path temporal map optimization for make-up temporal video grounding

Li, Jiaxiu ; Li, Kun ; Li, Jia ; Chen, Guoliang ; Wang, Meng ; Guo, Dan

Multimedia systems, 2024-06, Vol.30 (3), Article 140 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (16)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (15)
  2. Livros  (2)
  3. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de2012  (1)
  2. 2012Até2015  (1)
  3. 2016Até2017  (4)
  4. 2018Até2019  (3)
  5. Após 2019  (9)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.