Results 81 to 88 of about 4,943 (88)
Some of the next articles are maybe not open access.
A Survey on Fully Homomorphic Encryption
ACM Computing Surveys, 2018Paulo Martins, Leonel Sousa
exaly
Information security investment for competitive firms with hacker behavior and security requirements
Annals of Operations Research, 2015exaly
A two-dimensional circumplex approach to the development of a hacker taxonomy
Digital Investigation, 2006exaly
Adversarial knowledge-sharing in a coopetitive environment: a darknet hacker context
European Journal of Information SystemsObi Ogbanufe
exaly

