[1]
|
Analysis and Implementation of 3-D Transpositional Cipher Algorithm Based on Rubik’s Cube Mechanism
Journal of Soft Computing Paradigm,
2023
DOI:10.36548/jscp.2022.4.007
|
|
|
[2]
|
Video Conference System in Mixed Reality Using a Hololens
Computer Modeling in Engineering & Sciences,
2023
DOI:10.32604/cmes.2022.020491
|
|
|
[3]
|
Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users
Security Journal,
2023
DOI:10.1057/s41284-023-00376-3
|
|
|
[4]
|
Mobile Communication and Online Falsehoods in Asia
Mobile Communication in Asia: Local Insights, Global Implications,
2023
DOI:10.1007/978-94-024-2225-2_15
|
|
|
[5]
|
Anonymization Use Cases for Data Transfer in the Automotive Domain
2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops),
2023
DOI:10.1109/PerComWorkshops56833.2023.10150357
|
|
|
[6]
|
“I straight up criminalized myself on messenger”: law enforcement risk management among people who buy and sell drugs on social media
Drugs: Education, Prevention and Policy,
2023
DOI:10.1080/09687637.2023.2224497
|
|
|
[7]
|
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany
2023 IEEE Symposium on Security and Privacy (SP),
2023
DOI:10.1109/SP46215.2023.10179417
|
|
|
[8]
|
Storytelling as Innovative Method to Improve the Recognition of Teledentistry among Adults: A Randomized Controlled Trial
International Journal of Dentistry,
2023
DOI:10.1155/2023/8814905
|
|
|
[9]
|
Digital forensic analysis of the private mode of browsers on Android
Computers & Security,
2023
DOI:10.1016/j.cose.2023.103425
|
|
|
[10]
|
Implementation of A New Quasi-Cyclic Goppa Code in McEliece Cryptography
2023 IEEE 7th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE),
2023
DOI:10.1109/ICITISEE58992.2023.10404912
|
|
|
[11]
|
Emerging Technologies in Data Mining and Information Security
Advances in Intelligent Systems and Computing,
2023
DOI:10.1007/978-981-19-4676-9_55
|
|
|
[12]
|
Chat Application Using Homomorphic Encryption
ITM Web of Conferences,
2022
DOI:10.1051/itmconf/20225001011
|
|
|
[13]
|
Chat Application Using Homomorphic Encryption
ITM Web of Conferences,
2022
DOI:10.1051/itmconf/20225001011
|
|
|
[14]
|
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-7998-9164-2.ch005
|
|
|
[15]
|
The Wiley‐Blackwell Handbook of Childhood Social Development
2022
DOI:10.1002/9781119679028.ch38
|
|
|
[16]
|
Private Messaging Service using AES Encryption and Toxicity Detection
2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC),
2022
DOI:10.1109/ICESIC53714.2022.9783567
|
|
|
[17]
|
Inventive Systems and Control
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-981-19-1012-8_5
|
|
|
[18]
|
Anonymity Technologies in Investigative Journalism: A Tool for Inspiring Trust in Sources
Journalism Practice,
2022
DOI:10.1080/17512786.2022.2113740
|
|
|
[19]
|
Using WhatsApp messenger for health systems research: a scoping review of available literature
Health Policy and Planning,
2021
DOI:10.1093/heapol/czab024
|
|
|
[20]
|
Antiquities in a time of conflict: a crime script analysis of antiquities trafficking during the Syrian Civil War and implications for conflict antiquities
Crime Science,
2021
DOI:10.1186/s40163-021-00148-7
|
|
|
[21]
|
Delay distributions on encrypted real-time traffics
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/1898/1/012001
|
|
|
[22]
|
Computer crime: Russia on the Way to Corporate Criminal Responsibility
IV International Scientific and Practical Conference,
2021
DOI:10.1145/3487757.3490788
|
|
|
[23]
|
Computer crime: Russia on the Way to Corporate Criminal Responsibility
IV International Scientific and Practical Conference,
2021
DOI:10.1145/3487757.3490788
|
|
|
[24]
|
Computational Intelligence Methods in COVID-19: Surveillance, Prevention, Prediction and Diagnosis
Studies in Computational Intelligence,
2021
DOI:10.1007/978-981-15-8534-0_20
|
|
|
[25]
|
Fast Packet Inspection for End-To-End Encryption
Electronics,
2020
DOI:10.3390/electronics9111937
|
|
|
[26]
|
Who Needs an Encryption Backdoor: Why Americans want Security over Privacy.
American Journal of Science & Engineering,
2020
DOI:10.15864/ajse.1205
|
|
|
[27]
|
Reporting with WhatsApp: Mobile Chat Applications’ Impact on Journalistic Practices
Digital Journalism,
2019
DOI:10.1080/21670811.2019.1592693
|
|
|