Cited By
View all- Zeidler CAsghar M(2018)AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)10.1109/TrustCom/BigDataSE.2018.00140(996-1001)Online publication date: Aug-2018
- Hacıgümüş HIyer BMehrotra S(2014)Secure Computation on Outsourced Data: A 10-year RetrospectiveDatabase Systems for Advanced Applications10.1007/978-3-319-05810-8_2(16-27)Online publication date: 2014
- Purkait S(2012)Phishing counter measures and their effectiveness – literature reviewInformation Management & Computer Security10.1108/0968522121128654820:5(382-420)Online publication date: 23-Nov-2012
- Show More Cited By