Results
|
|
Survey on Vulnerabilities in Blockchain'S Smart Contracts by
- Jamshed, Huma
- Zahid, Ansha
- Hassan, Rizwan Ul
- Hussain, Ahmad
Source: Jisr( Journal of Independent Studies and Research) Management and Social Sciences& Economics
Material type: Article; Format:
print
Availability: Not available: Engr Abul Kalam Library: Available on Request (1).
|
|
|
|
|
|
|
|
|
|
|
|
Deciding Schema K-Secrecy for Xml Databases by
- Phonharath, Chittaphone
- Hashimoto, Kenji
Source: IEICE Transactions on Information and Systems
Material type: Article; Format:
print
Availability: Items available for loan: Engr Abul Kalam Library (1).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Hookup Teorem for Multilevel Security by
Source: IEEE Transactions on Software Engineering
Material type: Article; Format:
print
Availability: Items available for loan: Engr Abul Kalam Library (1).
|
|
|
|
|
|
|
|
|
|
|
|
The Sea View Security Model by
- Lunt, Teresa F
- Denning, Dorothy E
- Scheli, Mike
Source: IEEE Transactions on Software Engineering
Material type: Article; Format:
print
Availability: Items available for loan: Engr Abul Kalam Library (1).
|
|
|
Miro Visual Specificication of Security by
- Heydon, Alian
- Zaremski, Moormann
- Tygar, J. D
Source: IEEE Transactions on Software Engineering
Material type: Article; Format:
print
Availability: Items available for loan: Engr Abul Kalam Library (1).
|
|
|
|