X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
communication (2) 2
computational efficiency (2) 2
digital signatures (2) 2
distributing (2) 2
encryption (2) 2
internet (2) 2
mobile communication systems (2) 2
public key infrastructure (2) 2
wireless networks (2) 2
access control (1) 1
algebra (1) 1
algebraic geometry (1) 1
algorithms (1) 1
applied mathematics (1) 1
authenticity (1) 1
binary linear (1) 1
certificateless signcryption (1) 1
communications networks (1) 1
computer and information sciences (1) 1
computer applications (1) 1
computer information security (1) 1
computer memory (1) 1
computer networks (1) 1
computer programs (1) 1
computer science (1) 1
computer security (1) 1
computing time (1) 1
confidentiality (1) 1
congruential (1) 1
cost analysis (1) 1
cryptography (1) 1
data security (1) 1
design (1) 1
differential equations (1) 1
humans (1) 1
inclination (1) 1
index medicus (1) 1
internet of things (1) 1
key generation center (1) 1
mathematics (1) 1
medicine (1) 1
models, theoretical (1) 1
multidisciplinary sciences (1) 1
network analysis (1) 1
network security (1) 1
norms (1) 1
physical sciences (1) 1
privacy (1) 1
program verification (1) 1
r&d (1) 1
remainder hash (1) 1
research (1) 1
research & development (1) 1
research & development--r&d (1) 1
research and analysis methods (1) 1
research article (1) 1
research integrity (1) 1
safety and security measures (1) 1
scheme (1) 1
science (1) 1
science policy (1) 1
security (1) 1
security aspects (1) 1
simulation and modeling (1) 1
software (1) 1
software engineering (1) 1
telemedicine (1) 1
usage (1) 1
wireless communication systems (1) 1
wireless technology (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Computational and Theoretical Nanoscience, ISSN 1546-1955, 01/2018, Volume 15, Issue 1, pp. 78 - 86
With the advancement in mobile network, though message communication makes transmission of information relatively simple and quick, but poses severe threats on... 
Congruential | Certificateless signcryption | Remainder hash | Binary linear | Key generation center | Computer memory | Mobile communication systems | Wireless networks | Public Key Infrastructure | Encryption | Computational efficiency | Program verification (computers) | Cost analysis | Computing time | Distributing | Digital signatures | Communication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2010, Volume 8, Issue 2
  With the increasing inclination of people to use software systems for most of the purposes, comes a major challenge for software engineers - the engineering... 
Norms | Software | Internet | Computer information security | Inclination | Computer programs | Security aspects | Software engineering
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.