X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (751) 751
Conference Proceeding (656) 656
Patent (125) 125
Publication (92) 92
Book Chapter (83) 83
Dissertation (18) 18
Book / eBook (9) 9
Magazine Article (3) 3
Book Review (2) 2
Government Document (2) 2
Reference (2) 2
Paper (1) 1
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (757) 757
cryptographic protocols (657) 657
security (288) 288
computer science (259) 259
authentication (250) 250
computer science, information systems (186) 186
computer science, theory & methods (178) 178
engineering, electrical & electronic (165) 165
computer security (143) 143
encryption (132) 132
physics (132) 132
privacy (131) 131
education (127) 127
advertising (126) 126
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (125) 125
display (125) 125
seals (125) 125
information security (118) 118
computer science, software engineering (117) 117
counting (108) 108
calculating (107) 107
computing (107) 107
algorithms (106) 106
electric communication technique (106) 106
electricity (106) 106
verschlüsselung (105) 105
analysis (104) 104
electric digital data processing (102) 102
data security (101) 101
studies (97) 97
computer science, hardware & architecture (89) 89
transmission of digital information, e.g. telegraphiccommunication (89) 89
protection (82) 82
telecommunications (80) 80
public key (78) 78
public key cryptography (78) 78
data encryption (76) 76
communication system security (75) 75
internet (71) 71
access control (63) 63
hardware (59) 59
cryptographic protocol (55) 55
protocol (55) 55
protocols (55) 55
computer information security (54) 54
communications engineering, networks (51) 51
computer communication networks (49) 49
logic (48) 48
computer networks (47) 47
costs (46) 46
network security (46) 46
mathematics, applied (45) 45
access protocols (43) 43
cloud computing (43) 43
methods (42) 42
mathematical models (41) 41
verification (41) 41
coding and information theory (40) 40
computation (39) 39
protokoll (39) 39
security protocols (39) 39
mathematical analysis (38) 38
software (38) 38
cryptography and security (37) 37
biometrics (36) 36
theoretical computer science (35) 35
wireless sensor networks (34) 34
digital signatures (33) 33
elliptic curve cryptography (33) 33
operating systems (32) 32
usage (32) 32
application software (30) 30
calculus (30) 30
computer science, artificial intelligence (30) 30
networks (30) 30
routing protocols (30) 30
standards (30) 30
servers (29) 29
algorithm design and analysis (28) 28
authentication protocols (28) 28
formal verification (28) 28
safety and security measures (28) 28
laboratories (27) 27
pictorial communication, e.g. television (27) 27
ad hoc networks (26) 26
cryptographic algorithm (26) 26
cryptographic algorithms (26) 26
data privacy (26) 26
kryptographie (26) 26
management of computing and information systems (26) 26
polynomials (26) 26
secrecy (26) 26
wireless networks (26) 26
information storage (25) 25
key management (25) 25
artificial intelligence (24) 24
computational mathematics and numerical analysis (24) 24
computational modeling (24) 24
databases (24) 24
electronic commerce (24) 24
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1545) 1545
French (53) 53
German (23) 23
Japanese (9) 9
Chinese (8) 8
Korean (3) 3
Portuguese (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Automatic Control, ISSN 0018-9286, 4/2019, pp. 1 - 1
In this paper, we propose several opacity-preserving (bi)simulation relations for nondeterministic transition systems (NTSs) in terms of initial-state opacity,... 
Computer science | (Bi)simulation Relation | Automation | Automata | Silicon | Nondeterministic Transition System | Discrete-event systems | Opacity | Indexes | Cryptographic protocols
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 02/2012, Volume 7, Issue 1, pp. 3 - 13
Journal Article
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, ISSN 0278-0070, 04/2013, Volume 32, Issue 4, pp. 611 - 615
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 04/2019, Volume 68, Issue 4, pp. 3843 - 3853
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9393, pp. 39 - 57
Journal Article
IEEE Journal of Selected Topics in Quantum Electronics, ISSN 1077-260X, 11/2009, Volume 15, Issue 6, pp. 1630 - 1645
Journal Article
Journal of Computer and System Sciences, ISSN 0022-0000, 08/2013, Volume 79, Issue 5, pp. 518 - 529
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such... 
Cryptographic algorithm | Security | Real-time | Ubiquitous system | Schedule | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | EMBEDDED SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | REAL-TIME SYSTEMS | Computer science | Energy consumption | Safety and security measures | Algorithms | Analysis | Trees | Tasks | Graphs | Strategy | Computer information security | Optimization | Seats | Ubiquitous computing
Journal Article
Journal of Medical Systems, ISSN 0148-5598, 4/2018, Volume 42, Issue 4, pp. 1 - 5
Journal Article
Computers & Security, ISSN 0167-4048, 03/2013, Volume 33, pp. 59 - 69
This paper presents a generic approach to prevent board flooding attacks in remote electronic voting schemes providing coercion-resistance. A key property of... 
Forced-abstention attack | Remote electronic voting | Coercion-resistance | Board flooding attacks | Receipt-freeness | Cryptographic protocols | COMPUTER SCIENCE, INFORMATION SYSTEMS | SHUFFLE | PROOF | MIX | Voting | Floods | Studies | Bulletin boards | Tickets | Remote computing | Computer security | Online voting | Preserves | Electronics | Registers | Flooding | Computer information security
Journal Article
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 729, pp. 59 - 67
Conference Proceeding
Tongxin Xuebao/Journal on Communications, ISSN 1000-436X, 06/2016, Volume 37, Issue 6, pp. 75 - 85
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 563, pp. 221 - 231
Conference Proceeding
IEEE Access, ISSN 2169-3536, 2018, Volume 6, pp. 428 - 442
Journal Article
Computers and Electrical Engineering, ISSN 0045-7906, 07/2018, Volume 69, pp. 461 - 478
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10227, pp. 131 - 138
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.