Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top

Volume 2, Issue 2 (June, 2021) –

Cover Picture: In this paper, the autors present a stronger adversary model and show that our proposed design addresses the primary weaknesses of existing approaches to deniable storage under this stronger assumed adversary.
view this paper

Original Article

Review

Actions for selected articles

© 2016-2023 OAE Publishing Inc., except certain content provided by third parties