共 50 条
- [31] A Novel Approach for Prevention of SQL Injection Attacks Using Cryptography and Access Control Policies ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 26 - +
- [32] E-Smart Voting System with Secure Data Identification using Cryptography 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
- [33] A novel voting scheme using quantum cryptography 2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, : 66 - 71
- [34] Electronic Voting using Identity Based Cryptography FOURTH INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2010, PROCEEDINGS, 2010, : 31 - 36
- [35] E-PAYMENT SYSTEM USING VISUAL AND QUANTUM CRYPTOGRAPHY INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 1623 - 1628
- [36] A survey on cryptography algorithms in security of voting system approaches INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 190 - 200
- [37] A Proactive Approach to Preventing Phishing Attacks Using a Pshark PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 915 - 921
- [38] DEMONSTRATING DIFFERENT PHISHING ATTACKS USING FUZZY LOGIC PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 57 - 61
- [40] A system using provably strong cryptography is probably not secure: Some practical attacks IETE TECHNICAL REVIEW, 2002, 19 (04): : 161 - 168