Security analysis and new models on the intelligent symmetric key encryption (Englisch)
- Neue Suche nach: Zhou, Lu
- Neue Suche nach: Chen, Jiageng
- Neue Suche nach: Zhang, Yidan
- Neue Suche nach: Su, Chunhua
- Neue Suche nach: Anthony James, Marino
- Neue Suche nach: Zhou, Lu
- Neue Suche nach: Chen, Jiageng
- Neue Suche nach: Zhang, Yidan
- Neue Suche nach: Su, Chunhua
- Neue Suche nach: Anthony James, Marino
In:
Computers & security
;
80
;
14-24
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Security analysis and new models on the intelligent symmetric key encryption
-
Beteiligte:Zhou, Lu ( Autor:in ) / Chen, Jiageng ( Autor:in ) / Zhang, Yidan ( Autor:in ) / Su, Chunhua ( Autor:in ) / Anthony James, Marino ( Autor:in )
-
Erschienen in:Computers & security ; 80 ; 14-24
-
Verlag:
- Neue Suche nach: Elsevier Science B.V., Amsterdam.
-
Erscheinungsdatum:01.01.2019
-
Format / Umfang:11 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.805
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.805 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 80
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Another look at TLS ecosystems in networked devices vs. Web serversSamarasinghe, Nayanamana / Mannan, Mohammad et al. | 2019
- 14
-
Security analysis and new models on the intelligent symmetric key encryptionZhou, Lu / Chen, Jiageng / Zhang, Yidan / Su, Chunhua / Anthony James, Marino et al. | 2019
- 25
-
A quantitative textual analysis of three types of threat communication and subsequent maladaptive responsesMarett, Kent / Vedadi, Ali / Durcikova, Alexandra et al. | 2019
- 36
-
Detection of malicious and low throughput data exfiltration over the DNS protocolNadler, Asaf / Aminov, Avi / Shabtai, Asaf et al. | 2019
- 54
-
Why Johnny can't develop a secure application? A usability analysis of Java Secure Socket Extension APIWijayarathna, Chamila / Arachchilage, Nalin Asanka Gamagedara et al. | 2019
- 74
-
HEART-IS: A novel technique for evaluating human error-related information security incidentsEvans, Mark / He, Ying / Maglaras, Leandros / Janicke, Helge et al. | 2019
- 90
-
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacksLiu, Ximing / Li, Yingjiu / Deng, Robert H. / Chang, Bing / Li, Shujun et al. | 2019
- 108
-
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT contextSillic, Mario et al. | 2019
- 120
-
A scalable and extensible framework for android malware detection and family attributionZhang, Li / Thing, Vrizlynn L.L. / Cheng, Yao et al. | 2019
- 134
-
SCADAWall: A CPI-enabled firewall model for SCADA securityLi, Dong / Guo, Huaqun / Zhou, Jianying / Zhou, Luying / Wong, Jun Wen et al. | 2019
- 155
-
SDN Access Control for the MassesPaladi, Nicolae / Gehrmann, Christian et al. | 2019
- 173
-
EMotion: An SGX extension for migrating enclavesPark, Jaemin / Park, Sungjin / Kang, Brent Byunghoon / Kim, Kwangjo et al. | 2019
- 186
-
A comprehensive approach to the automatic refinement and verification of access control policiesCheminod, Manuel / Durante, Luca / Seno, Lucia / Valenza, Fulvio / Valenzano, Adriano et al. | 2019
- 200
-
Empirical study on lexical sentiment in passwords from Chinese websitesZeng, Jianping / Duan, Jiangjiao / Wu, Chengrong et al. | 2019
- 211
-
Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher educationRajab, Majed / Eydgahi, Ali et al. | 2019
- 224
-
The establishment of collaboration in managing information security through multisourcingNaicker, V / Mafaiti, M et al. | 2019
- 238
-
Design recommendations for online cybersecurity coursesGonzález-Manzano, Lorena / de Fuentes, Jose M. et al. | 2019
- 257
-
Securing android applications via edge assistant third-party library detectionTang, Zhushou / Xue, Minhui / Meng, Guozhu / Ying, Chengguo / Liu, Yugeng / He, Jianan / Zhu, Haojin / Liu, Yang et al. | 2019
- 273
-
Find me a safe zone: A countermeasure for channel state information based attacksZhang, Jie / Tang, Zhanyong / Li, Meng / Fang, Dingyi / Chen, Xiaojiang / Wang, Zheng et al. | 2019
- 291
-
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5Guan, Chong / Sun, Kun / Lei, Lingguang / Wang, Pingjian / Wang, Yuewu / Chen, Wei et al. | 2019
- 306
-
Identifying infected users via network trafficGratian, Margaret / Bhansali, Darshan / Cukier, Michel / Dykstra, Josiah et al. | 2019
- 317
-
Greedy and evolutionary algorithms for mining relationship-based access control policiesBui, Thang / Stoller, Scott D. / Li, Jiajie et al. | 2019
- ii
-
Computers & Security Editorial Board| 2019