Have a personal or library account? Click to login

Showing 1-12 of 379

Clear all
Subject:
Fundamentals of computer sciences
ML-GS: Module Lattice-Based Group Signature Scheme
Article

ML-GS: Module Lattice-Based Group Signature Scheme

Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Article

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Article

A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions

Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Volume 20 (2025): Issue 3 (December 2025)
Issue

Volume 20 (2025): Issue 3 (December 2025)

A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Article

A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem

Abdellatif Kichna, Abderrazak Farchane, Said Hakimi
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Article

(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares

Yogesh K. Meghrajani, Vishakha J. Kapadiya, Laxmi S. Desai
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Article

Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI

Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat
Volume 20 (2025): Issue 2 (September 2025)
Issue

Volume 20 (2025): Issue 2 (September 2025)

Infrastructure as Code with Azure Bicep
Book

Infrastructure as Code with Azure Bicep

Adora Nwodo
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Article

Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation

Seyyed Mohsen Hashemi, Patrick C. K. Hung
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Article

Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions

Amira Talha, Tarek Frikha, Jalel Ktari, Habib Hamam
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Article

Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs

Khushboo Jain