Biblio
Export 21404 results:
A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem." Journal of Information Hiding and Multimedia Signal Processing 5, no. 2 (2014).
"Secure Socket Layer (SSL) Impact on Web Server Performance." Journal of Advances in Computer Networks 2, no. 3 (2014): 211-217.
"Securing the Border in Bosnia and Herzegovina: An Exploratory Analysis of the Impact of Training on Officers' Knowledge and Experiences Related to Sex Trafficking." European Journal on Criminal Policy & Research 20, no. 2 (2014): 225-241.
"Securitization of Kurdish Question in Turkey." International Journal of Research in Social Sciences 4, no. 2 (2014).
"Securitization of Terrorism in Weak States: The Case of Central Asia." In International Conference on “Prospects of EU-Central Asia Relations”. Kazakhstan: Almaty, 2014.
"Security and Defence Policy in the European Union. Basimgstoke: Palgrave MacMillan, 2014.
Security challenges of E-government adoption based on end users' perspective ." In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) ., 2014.
"Security Concerns and Trust in the Adoption of M-Commerce." Social Technologies 4, no. 1 (2014): 179-191.
"A security evaluation of AIS automated identification system In ACSAC '14, 30th Annual Computer Security Applications Conference., 2014.
Security Factors Influencing End Users’ Adoption of E-Government." Journal of Internet Technology and Secured Transactions (JITST) 3, no. 4 (2014).
"Security Informed Safety Assessment of Industrial FPGA-Based Systems." In Probabilistic Safety Assessment and Management PSAM 12. Honolulu, Hawaii, 2014.
"Security informed safety assessment of NPP I&C systems: GAP-IMECA technique In 22nd International Conference on Nuclear Engineering ICONE22. Prague, Czech Republic, 2014.
Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
"Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond. NCC Group, 2014.
Security Policy 2014. Ministry of Interior, 2014.
Serbia: Progress Report. European Commission, 2014.
Setting the agenda for research on issue arenas." Corporate Communications: An International Journal 19, no. 2 (2014): 200-215.
"The Shale Revolution: Its Impact and Implications for India." Indian Foreign Affairs Journal 9, no. 4 (2014): 370-383.
"The Shanghai Cooperation Organisation: A Tenable Provider of Security in Post-2014 Central Asia?. Asia-Pacific Center for Security Studies, 2014.
Sheikh Yusuf Qaradawi on International Relations: The Discourse of a Leading Islamist Scholar (1926–)." Middle Eastern Studies 50, no. 1 (2014): 2-26.
"Shi 'a politics,“strategic culture” and Iran's relations with the South Caucasus." In Religion, Nation and Democracy in the South Caucasus. Routledge, 2014.
""Should there be a united Ossetia?" The Caucasus Echo (2014).
Significant Cyber Incidents since 2006. CSIS, 2014.
Signs of technologies of ‘hybrid war’ in aggressive actions of Russia against Ukraine." Science and Defense 3 (2014): 17-25.
"