E-Business and Telecommunications: 17th International Conference on E-Business and Telecommunications, Icete 2020, Online Event, July 8-10, 2020, Revi
No Customer Reviews
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.- Security and Complexity of a New Variant of the McEliece Cryptosystem using Non-linear Convolutional Codes.- A Secure Distributed Hash-Based Encryption suited for Big Data Systems.- An Assurance Framework and Process for Hybrid Systems.- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.- Practically Efficient Attribute-based Encryption for Compartmented and Multilevel Access Structures.- Analysis of In-place Randomized Bit-flipping Decoders for the Design of LDPC and MDPC Code-based Cryptosystems.- Business Analyst Tasks for Requirement Elicitation.- Chained Transaction Protocol Automated Verification using Cl-AtSe.- Overall Feasibility of RF Energy Harvesting for IoT.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.