A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment. | 2 | 0.35 | 2018 |
Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping. | 1 | 0.37 | 2017 |
On the Balancing Security Against Performance in Database Systems | 0 | 0.34 | 2015 |
Security trade-off and energy efficiency analysis in wireless sensor networks | 4 | 0.57 | 2015 |
Multihop Node Authentication Mechanisms for Wireless Sensor Networks. | 2 | 0.39 | 2014 |
On The Effect Of Security And Communication Factors In The Reliability Of Wireless Sensor Networks | 0 | 0.34 | 2014 |
On the efficiency modelling of cryptographic protocols by means of the quality of protection modelling language (QoP-ML) | 1 | 0.36 | 2013 |
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). | 2 | 0.43 | 2012 |
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2 | 1 | 0.36 | 2011 |
Voter non-repudiation oriented scheme for the medium scale e-voting protocol | 0 | 0.34 | 2009 |