|
53761 |
Simulafed: an enhanced federated simulated environment for privacy and security in health Enthalten in Computing Bd. 107, 20.11.2024, Nr. 1, date:1.2025: 1-30
|
|
|
53762 |
Simulation-based security of function-hiding inner product encryption Enthalten in Science China / Information sciences Bd. 61, 19.1.2018, Nr. 4, date:4.2018: 1-3
|
|
|
53763 |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Enthalten in Designs, codes and cryptography Bd. 87, 9.8.2018, Nr. 6, date:6.2019: 1345-1371
|
|
|
53764 |
Simulation Implementation and Verification of a Security Framework for ICS Based on SPD Enthalten in Automatic control and computer sciences Bd. 57, 21.4.2023, Nr. 1, date:2.2023: 37-47
|
|
|
53765 |
Simulation study on the security of consensus algorithms in DAG-based distributed ledger Enthalten in Frontiers of computer science Bd. 18, 25.11.2023, Nr. 3, date:6.2024: 1-12
|
|
|
53766 |
SINA: IT-Sicherheit als Infrastruktur betrachtet Enthalten in Datenschutz und Datensicherheit Bd. 45, 23.9.2021, Nr. 10, date:10.2021: 659-663
|
|
|
53767 |
Sind Hash-Werte personenbezogene Daten? Enthalten in Datenschutz und Datensicherheit Bd. 41, 31.10.2017, Nr. 11, date:11.2017: 686-687
|
|
|
53768 |
Sind mobile Endgeräte eine Schwachstelle – oder eher Ihre Security-Strategie? Enthalten in Digitale Welt Bd. 3, 4.3.2019, Nr. 2, date:4.2019: 59-64
|
|
|
53769 |
Sind Sie sicher? Enthalten in Wirtschaftsinformatik & Management Bd. 14, 16.2.2022, Nr. 1, date:2.2022: 1
|
|
|
53770 |
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card Enthalten in Multimedia tools and applications Bd. 75, 4.11.2015, Nr. 24, date:12.2016: 17215-17245
|
|