Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yubao Zhang, Haining Wang, Angelos Stavrou |
A multiview clustering framework for detecting deceptive reviews. |
J. Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Vinod Ramesh Falmari, M. Brindha 0001 |
Secure authentication protocols to resist off-line attacks on authentication data table. |
J. Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha |
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. |
J. Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray |
The intrinsic dimensionality of network datasets and its applications. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jingzhe Wang, Balaji Palanisamy |
Securing blockchain-based timed data release against adversarial attacks. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Radu Ciucanu, Pascal Lafourcade 0001, Marius Lombard-Platet, Marta Soare |
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Asma Salem, Ahmad Abdel-Aziz Sharieh, Riad Jabri |
Online User Authentication System Using Keystroke Dynamics. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Shamik Sural, Haibing Lu |
Guest editors' introduction. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Flávio Neves, Rafael Roque de Souza, Juliana Sousa, Michel S. Bonfim, Vinicius C. Garcia |
Data privacy in the Internet of Things based on anonymization: A review. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Diego Sempreboni, Luca Viganò 0001 |
A mutation-based approach for the formal and automated analysis of security ceremonies. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos |
Towards verifiable web-based code review systems. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Pietro Ferrara 0001, Claudio Lucchese |
Certifying machine learning models against evasion attacks by program analysis. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | David Mestel, Johannes Müller 0001, Pascal Reisert |
How efficient are replay attacks against vote privacy? A formal quantitative analysis. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ziyang Han, Qingqing Ye 0001, Haibo Hu 0001 |
OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios |
Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali |
Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jianfeng Zhang, Wensheng Zhang, Jingdong Xu |
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Klenze, Christoph Sprenger 0001, David A. Basin |
IsaNet: A framework for verifying secure data plane protocols. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Liyi Li 0002, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks 0001 |
A formal model of Checked C. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Cheval, Raphaëlle Crubillé, Steve Kremer |
Symbolic protocol verification with dice. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Mondal, Maximilian Algehed, Owen Arden |
Flow-limited authorization for consensus, replication, and secret sharing. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding 0001 |
Universal optimality and robust utility bounds for metric differential privacy. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Kengo Zenitani |
A scalable algorithm for network reachability analysis with cyclic attack graphs. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg |
Machine-checked proofs of privacy against malicious boards for Selene & Co. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao |
A review on cloud security issues and solutions. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, David A. Naumann |
Special issue: 35th IEEE Computer Security Symposium - CSF 2022. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Anis Bkakria |
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham |
Con2Mix: A semi-supervised method for imbalanced tabular security data. |
J. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi |
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Antti Hakkala, Jani Koskinen |
Personal data protection in the age of mass surveillance. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel |
Adversarial examples for network intrusion detection systems. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. Powell |
Securing LSB embedding against structural steganalysis. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai |
Range search on encrypted spatial data with dynamic updates. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Mor Lilintal |
Gradual GRAM and secure computation for RAM programs. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ben Kreuter, Sarvar Patel, Ben Terner |
Private identity agreement for private set functionalities. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Michele De Donno, Xenofon Fafoutis, Nicola Dragoni |
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Stéphanie Delaune, Jannik Dreier, Elise Klein 0002 |
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann 0001 |
Modelling human threats in security ceremonies. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Groß 0001, Luca Viganò 0001 |
Special issue on socio-technical aspects in security - editorial. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Albesë Demjaha, Simon Parkin, David J. Pym |
The boundedly rational employee: Security economics for behaviour intervention support in organizations. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren 0001, Phuc Thai, Hong-Sheng Zhou |
Scriptable and composable SNARKs in the trusted hardware model. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard |
Fast threshold ECDSA with honest majority. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Jamroga, Damian Kurpiewski, Vadim Malvone |
How to measure usable security: Natural strategies in voting protocols. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Baum, Daniel Escudero 0001, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza |
Efficient protocols for oblivious linear function evaluation from ring-LWE. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | George Chatzisofroniou, Panayiotis Kotzanikolaou |
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Simon Parkin, Yi Ting Chua 0001 |
A cyber-risk framework for coordination of the prevention and preservation of behaviours. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade 0001, Léo Robert |
Optimal threshold padlock systems. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso |
Anonymity and rewards in peer rating systems. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Imre Lendák, Balázs Indig, Gábor Palkó |
WARChain: Consensus-based trust in web archives via proof-of-stake blockchain technology. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato |
On the feasibility of crawling-based attacks against recommender systems. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Paul, Patrik Scheible, Friedrich Wiemer |
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Scott Harper, Maryam Mehrnezhad, John C. Mace |
User Privacy Concerns in Commercial Smart Buildings. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Isaac Amankona Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao |
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qingtian Zou, Anoop Singhal, Xiaoyan Sun 0003, Peng Liu 0005 |
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | |
Selected Papers From ESORICS 2020. |
J. Comput. Secur. |
2022 |
DBLP BibTeX RDF |
|
1 | Dario Catalano, Georg Fuchsbauer, Azam Soleimanian |
Double-authentication-preventing signatures in the standard model. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Liron David, Avishai Wool |
PESrank: An Explainable online password strength estimator. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Kadam Vikas Samarthrao, Vandana Milind Rohokale |
Enhancement of email spam detection using improved deep learning algorithms for cyber security. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Clemente Galdi, Vladimir Kolesnikov |
Special issue: Security and Cryptography for Networks - SCN 2020. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Haya Schulmann, Michael Waidner |
Special issue ESORICS 2021. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoning Liu 0002, Yifeng Zheng, Xingliang Yuan, Xun Yi |
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Sonam Mittal, K. R. Ramkumar |
Research perspectives on fully homomorphic encryption models for cloud sector. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese |
FWS: Analyzing, maintaining and transcompiling firewalls. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sonam Mittal, K. R. Ramkumar |
Research perspectives on fully homomorphic encryption models for cloud sector. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Mina Sheikhalishahi, Ischa Stork, Nicola Zannone |
Privacy-preserving policy evaluation in multi-party access control. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang |
Lattice-based remote user authentication from reusable fuzzy signature. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Guangjun Li, Preetpal Sharma, Lei Pan 0002, Sutharshan Rajasegarar, Chandan K. Karmakar, Nicholas Charles Patterson |
Deep learning algorithms for cyber security applications: A survey. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ben Smyth |
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Himani Sharma, Navdeep Kanwal |
Video interframe forgery detection: Classification, technique & new dataset. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Helen-Maria Dounavi, Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis |
A graph-based framework for malicious software detection and classification utilizing temporal-graphs. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Md. Morshed Alam, Weichao Wang |
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang |
Publicly auditable conditional blind signatures. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee |
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwu Xu 0001, Hongxu Chen 0001, Alwen Tiu, Yang Liu 0003, Kunal Sareen |
A permission-dependent type system for secure information flow analysis. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abraão Aires Urquiza, Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Resource and timing aspects of security protocols. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Andronicus Ayobami Akinyelu |
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Jiang, Boquan Li 0002, Baole Wei, Gang Li 0009, Chao Liu 0020, Weiqing Huang, Meimei Li, Min Yu 0001 |
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ghandi Hessam, Ghassan Saba, M. Iyad Alkhayat |
A new approach for detecting violation of data plane integrity in Software Defined Networks. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson 0001 |
Directed adversarial sampling attacks on phishing detection. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Bichhawat, Vineet Rajani, Deepak Garg 0001, Christian Hammer 0001 |
Permissive runtime information flow control in the presence of exceptions. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Federico Griscioli, Maurizio Pizzonia |
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems. |
J. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yifang Wu, Jianjun Huang 0001, Bin Liang 0002, Wenchang Shi |
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse |
Verification of stateful cryptographic protocols with exclusive OR. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 |
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mabin Joseph, Gautham Sekar, R. Balasubramanian |
Side channel analysis of SPECK. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos |
Towards adding verifiability to web-based Git repositories. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li 0007, Pengfei Wu, Anyi Liu |
A new framework for privacy-preserving biometric-based remote user authentication. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson, Somesh Jha |
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Phu H. Phung, Rakesh S. V. Reddy, Steven Cap, Anthony Pierce, Abhinav Mohanty, Meera Sridhar |
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kushal Babel, Vincent Cheval, Steve Kremer |
On the semantics of communications when verifying equivalence properties. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah |
Efficient backward private searchable encryption. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hongcheng Li, Jianjun Huang 0001, Bin Liang 0002, Wenchang Shi, Yifang Wu, Shilei Bai |
Identifying parasitic malware as outliers by code clustering. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray |
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Federico De Meo, Luca Viganò 0001 |
A formal and automated approach to exploiting multi-stage attacks of web applications. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Ángel Díaz de León Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez |
A systematic review of security threats and countermeasures in SaaS. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Christian Skalka, Sepehr Amir-Mohammadian, Samuel Clark |
Maybe tainted data: Theory and a case study. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tachio Terauchi, Timos Antonopoulos |
Bucketing and information flow analysis for provable timing attack mitigation. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Vineet Rajani, Deepak Garg 0001 |
On the expressiveness and semantics of information flow types. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Elisavet Kozyri, Fred B. Schneider |
RIF: Reactive information flow labels. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rui Liu, Jun Song 0003, Zhiming Huang 0002, Jianping Pan 0001 |
EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions. |
J. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|