Most Popular Books
- Securing personal health records in the cloud by using attribute based encryption. A review
- An Improved Three Factor Remote User Authentication Scheme Using Smart Card. A Review
- A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios
- My Experiments with Database Management System: Part II
- Internet of Things Security: Challenges, Advances, and Analytics