Results 201 to 210 of about 94,493 (210)
Some of the next articles are maybe not open access.
Food Security: The Challenge of Feeding 9 Billion People
Science, 2010Lawrence Haddad, Jules N Pretty
exaly
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Annual International Cryptology Conference, 2016Benoît Cogliati, Y. Seurin
semanticscholar +1 more source
A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
IEEE Communications Surveys and Tutorials, 2013Alexandros G Fragkiadakis
exaly
Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges
IEEE Communications Surveys and Tutorials, 2019Mehdi Sookhak, Ying He, Fei Richard Yu
exaly
Viral security proteins: counteracting host defences
Nature Reviews Microbiology, 2010Vadim I Agol
exaly
Proofs Beyond the Birthday Bound on Ψk with the H-Coefficient Method
, 2017Valérie Nachef +2 more
semanticscholar +1 more source
Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
IEEE Communications Surveys and Tutorials, 2015Danda B Rawat
exaly
A Survey on Security Aspects for LTE and LTE-A Networks
IEEE Communications Surveys and Tutorials, 2014Jin Cao, Hui Li
exaly
A Survey of Security Attacks in Information-Centric Networking
IEEE Communications Surveys and Tutorials, 2015Eslam G Abdallah +2 more
exaly

