Issue | Title | |
Volume 3, Issue 5, September 2014 | Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags | Abstract PDF |
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki | ||
Volume 3, Issue 2, March 2014 | Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing | Abstract PDF |
Masoudeh Keshavarzi | ||
Volume 3, Issue 6, November 2014 | Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol | Abstract PDF |
Seyed Mohammad Alavi, Behzad Abdolmaleki, Karim Baghery | ||
26 - 28 of 28 Items | << < 1 2 |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"