Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols


Volume 2, Issue 2 (2021) –

Cover Picture: In this paper, the autors present a stronger adversary model and show that our proposed design addresses the primary weaknesses of existing approaches to deniable storage under this stronger assumed adversary.
view this paper

Original Article


Actions for selected articles

© 2016-2022 OAE Publishing Inc., except certain content provided by third parties