researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Issue
Volume
28
, Issue
1-2
1
--
19
Shivi Garg
,
R. K. Singh
,
A. K. Mohapatra
.
Analysis of software vulnerability classification based on different technical parameters
20
--
34
Lanfranco Lopriore
.
Key management in wireless sensor networks
35
--
45
Milap J. Bhuva
,
Sanjay Singh
.
Symmetric key-based authenticated encryption protocol
46
--
54
Mikhail Styugin
.
Protection from reconnaissance for establishing information security systems