Results 121 to 130 of about 145,910 (140)
Some of the next articles are maybe not open access.
Symposium on Information and Communication Technology, 2016
Nang Hung Van Nguyen, M. Pham, P. Do
semanticscholar +1 more source
Nang Hung Van Nguyen, M. Pham, P. Do
semanticscholar +1 more source
Overview of mobile agents and security
2016 International Conference on Engineering & MIS (ICEMIS), 2016Sophia Alami-Kamouri+2 more
semanticscholar +1 more source
Global threats to human water security and river biodiversity
Nature, 2010Mark O Gessner+2 more
exaly
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Annual Meeting of the IEEE Industry Applications Society, 2015I. Mir, Dong Seong Kim, A. Haqiq
semanticscholar +1 more source
A Survey on Security and Privacy Issues of Bitcoin
IEEE Communications Surveys and Tutorials, 2018E Sandeep Kumar+2 more
exaly
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani+2 more
exaly
Croatia’s computer laws: promotion of growth in E-commerce via greater cyber-security
, 2008S. Blythe
semanticscholar +1 more source