-
1
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
2
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
3
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
4
-
5
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
6
-
7
A Program for Master of Information Technology
Published 2022“…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
Get full text
Other -
8
Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010
Published 2023-08-01“…Abstract Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
Get full text
Article -
9
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Applying these two techniques to Dilithium, we obtain an advanced signature scheme with better efficiency, and without any other losses except some pre-computations. Security reduction demonstrates that our scheme is also SUF-CMA in QROM. …”
Get full text
Article -
10
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Get full text
Article