Volume 8; Issue 3

9

Design and implementation of a malware detection system based on network behavior

Year:
2015
Language:
english
File:
PDF, 849 KB
english, 2015
10

Privacy preserving revocable predicate encryption revisited

Year:
2015
Language:
english
File:
PDF, 252 KB
english, 2015
14

Private set intersection via public key encryption with keywords search

Year:
2015
Language:
english
File:
PDF, 167 KB
english, 2015
16

Issue Information

Year:
2015
File:
PDF, 481 KB
2015