Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols

Top

Volume 2, Issue 2 ( 2021) –

Cover Picture: In this paper, the autors present a stronger adversary model and show that our proposed design addresses the primary weaknesses of existing approaches to deniable storage under this stronger assumed adversary.
view this paper

Original Article

Review

Actions for selected articles

© 2016-2021 OAE Publishing Inc., except certain content provided by third parties