Your search returned 28 results.

Sort
Results
Survey on Vulnerabilities in Blockchain'S Smart Contracts by
  • Jamshed, Huma
  • Zahid, Ansha
  • Hassan, Rizwan Ul
  • Hussain, Ahmad
Source: Jisr( Journal of Independent Studies and Research) Management and Social Sciences& Economics
Material type: Article Article; Format: print
Availability: Not available: Engr Abul Kalam Library: Available on Request (1).
Assessing Human Needs Theory: an Approach to Conflict Resolution by
  • Azam, A
  • Rehman, S
Source: The Nucleus; a Quarterly Scientific Journal
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Securing Gateways with in Clustered Power Centric Network of Nodes by
  • Javaid, QaiSAR
  • Daud Awan, Muhammad
  • Naqvi, Syed Husnain A
Source: Mehran University Research Journal of Engineeering and Technology
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Realization of Ambient Wireless Network System Based on Spatialiy Distributed Ciphering Function by
  • Okada, Mas Ashi
  • Hatanaka, Masahide
  • Kagawa, KeIIchiro
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Deciding Schema K-Secrecy for Xml Databases by
  • Phonharath, Chittaphone
  • Hashimoto, Kenji
Source: IEICE Transactions on Information and Systems
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Evaluations and Analysis of Malware Prevention Methods on Websites by
  • Yagi, Takeshi
  • Murayama, Junichi
Source: IEICE Transactions on Communications
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Security Risks in Nuclear Waste Management: Exceptionalism, Opaqueness and Vulnerability by
  • Beken, Tom Vander
  • Dorn, Nicholas
Source: Journal of Environmental Management
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
A Digital Signature Scheme Using Diffie-Heliman Key Exchange by
  • Uddin, Muhammad Fareed
  • Siddiqui, Kashif
Source: Journal of Independent Studies and Research: Computing
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Optimal Protection of Complex Networks Exposed to a Terrorist Hazard: a Multi-Objective Evolutionary Approach by
  • Salazar A, D.E
  • Rocco S, C.M
  • Zio, E
Source: Journal of Risk and Reliability: Proceedings OfI Mech E Part-O
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Optimal Information-Dispersal for Fault-Tolerant Communication Over a Burst-Error Channel by
  • Huang, Yu-Lun
  • Tsai, Yea-Ching
  • Shieh, Shiuh-Pyng
Source: IEEE Transactions on Reliability
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Achieving High Dependability of an Endoscopy Recommender System (Ers) by
  • Zielinski, Jan
  • Krawczyk, Henryk
Source: Task Quarterly: Scientific Bulietin of Academic Computer Centre in Gdansk
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Recognizing Immediacy in an N-Tree Hierarchy and its Application to Protection Groups by
  • Sandhu, Ravinderpal S
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Addressing Dependability By Applying An Approach for Model-Based Risk Assessment by
  • Gran, Bjorn Axel
Source: Reliability Engineering and System Safety
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
A Hookup Teorem for Multilevel Security by
  • Culiough, Daral Mc
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
A for mal Approach toIntegrated Analysis of Security and Qos by
  • Bernardo, M. Di
Source: Reliability Engineering and System Safety
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Contrapuntal Geographies of Threat and Security:United States, India, and Israel by
  • Oza, Rupal
Source: Environment and Planning:Society and Space.(D)
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
A Specification and V Erification Method for Preventing Denial of Serviec by
  • Yu, Cheng
  • Gligor, Virgil D
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
The Sea View Security Model by
  • Lunt, Teresa F
  • Denning, Dorothy E
  • Scheli, Mike
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Miro Visual Specificication of Security by
  • Heydon, Alian
  • Zaremski, Moormann
  • Tygar, J. D
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Analysis ofStatistical Cipher Feedback Mode of Block Ciphers by
  • Heys, H M
Source: IEEE TransactionsonComputers
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Pages