+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Volume 10, Issue 2, May 2020 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
5G core network security issues and attack classification from network protocol perspective
Hwankuk Kim
[abstract]
Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble
Lasse Herskind, Panagiota Katsikouli, and Nicola Dragoni
[abstract]
Secure Computation Outsourcing for Inversion in Finite Field
Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, and Jia Yu
[abstract]
Micro-frontends: application of microservices to web front-ends
Andrey Pavlenko, Nursultan Askarbekuly, Swati Megha, and Manuel Mazzara
[abstract]
Policy Review in Attribute Based Access Control
A Policy Machine Case Study
A Policy Machine Case Study
Sherifdeen Lawa and Ram Krishnan
[abstract]
Detecting Malicious Middleboxes In Service Function Chaining
Nguyen Canh Thang and Minho Park
[abstract]
A Multilayer Approach for Recommending Contextual Learning Paths
Francesco Colace, Massimo De Santo, Marco Lombardi, Rosalba Mosca, and Domenico Santaniello
[abstract]
DCG: A Client-side Protection Method for DNS Cache
Yan Zhao, Ning Hu, Chi Zhang, and Xinda Cheng
Yan Zhao, Ning Hu, Chi Zhang, and Xinda Cheng
[abstract]
[Goto Archives]