Growing Science » Tags cloud » Security
Authors: Mohammed Alarefi
DOI: 10.5267/j.ijdns.2022.10.004
Keywords: UTAUT, Internet of Things, IoT wearable health device, Technological complexity, Security, Privacy
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 1 | Views: 727 | Reviews: 0
Authors: Sedigheh Ahmadi Fasih
Keywords: Copyright, Digital libraries, Security
Journal: MSL | Year: 2013 | Volume: 3 | Issue: 11 | Views: 2035 | Reviews: 0
Authors: Ali Sepehri-Rad, S.J. Sadjadi, Soheil Sadi-Nezhad
DOI: 10.5267/j.ijdns.2019.1.002
Keywords: Online banking, Parsian bank, Authentication, Security
Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1730 | Reviews: 0
Authors: Zahra Alishahi, Javad Mirabedini, Marjan Kuchaki Rafsanjani
DOI: 10.5267/j.msl.2012.08.018
Keywords: Ad hoc, AODV, MANETs, Packet drop attack, Security
Journal: MSL | Year: 2012 | Volume: 2 | Issue: 7 | Views: 2326 | Reviews: 0
® 2010-2024 GrowingScience.Com