To see the other types of publications on this topic, follow the link: Electronic security.

Journal articles on the topic 'Electronic security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Electronic security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cullinane, David. "Electronic Commerce Security." Information Systems Security 7, no. 3 (1998): 54–65. http://dx.doi.org/10.1201/1086/43300.7.3.19980901/31009.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Dr D. R. V. A. Sharath, N. Soumya, Bhukya Ramesh, and Thatikayala Sandeep. "Three Tire Security System for Electronic Voting Machine." International Journal of Psychosocial Rehabilitation 23, no. 1 (2019): 449–54. http://dx.doi.org/10.37200/ijpr/v23i1/pr190257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ai, Jing Feng. "Study and Design on Electronic Cash System Security Architecture." Advanced Materials Research 816-817 (September 2013): 962–66. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.962.

Full text
Abstract:
The rapid development of electronic financial services, attendant come an increasingly serious network security problem, especially electronic cash exchange network security issues facing the urgent need to resolve. In this paper, electronic cash scheme detailed research and analysis, and then design a secure electronic cash system based on an improved theory of electronic cash scheme, it includes detailed electronic payment requirements analysis, system design, e-commerce payment system design, server design and client design. Finance and electronics industry combining electronic financial system, if they can effectively solve the security issues, I believe it can be quickly developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Bessler, Sandford. "Electronic Security und Privacy." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 115. http://dx.doi.org/10.1007/s00502-010-0729-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

King, Christopher M. "Internet Electronic Mail Security." Information Systems Security 7, no. 2 (1998): 1–7. http://dx.doi.org/10.1201/1086/43303.7.2.19980601/31043.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amoroso, Edward, and Matthew Bishop. "Security enables electronic commerce." Journal of Network and Systems Management 4, no. 3 (1996): 247–49. http://dx.doi.org/10.1007/bf02139145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ekerbrink, Ivan. "Security of electronic transactions." Computers & Security 5, no. 2 (1986): 168. http://dx.doi.org/10.1016/0167-4048(86)90148-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Price, Wyn L. "Security in electronic mail." Computer Communications 9, no. 2 (1986): 96–99. http://dx.doi.org/10.1016/0140-3664(86)90009-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Radl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government." International Journal of Electronic Government Research 1, no. 1 (2005): 79–99. http://dx.doi.org/10.4018/jegr.2005010105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

YAMANAKA, KIYOSHI. "Information Security and Electronic Commerce." Journal of the Institute of Electrical Engineers of Japan 117, no. 6 (1997): 365–68. http://dx.doi.org/10.1541/ieejjournal.117.365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wilk, Jarosław. "SECURITY OF COMPOSITE ELECTRONIC SERVICES." International Journal of New Computer Architectures and their Applications 5, no. 3 (2015): 127–40. http://dx.doi.org/10.17781/p001968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kovacich, Gerald. "Electronic-internet business and security." Computers & Security 17, no. 2 (1998): 129–35. http://dx.doi.org/10.1016/s0167-4048(97)81982-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shain, Mike. "Security and electronic data interchange." Computer Audit Update 1990, no. 4 (1990): 4–12. http://dx.doi.org/10.1016/s0960-2593(05)80018-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bahr, Alice Harrison. "Electronic Collection Security Systems Today." Library & Archival Security 11, no. 1 (1991): 3–22. http://dx.doi.org/10.1300/j114v11n01_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lipton, J. D. "Security Interests in Electronic Databases." International Journal of Law and Information Technology 9, no. 1 (2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

D'Angelo, Diana M., Bruce McNair, and Joseph E. Wilkes. "Security in Electronic Messaging Systems." AT&T Technical Journal 73, no. 3 (1994): 7–13. http://dx.doi.org/10.1002/j.1538-7305.1994.tb00584.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Giraud, Bertrand. "Electronic surveillance — or security perverted." Science as Culture 1, no. 2 (1988): 120–30. http://dx.doi.org/10.1080/09505438809526203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Asti, Melinda, Ahmad Kamsyakawuni, and Kiswara Agung Santoso. "PENGAMANAN IMAGE DENGAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK (ECB)." Majalah Ilmiah Matematika dan Statistika 18, no. 2 (2018): 91. http://dx.doi.org/10.19184/mims.v18i2.17252.

Full text
Abstract:
Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example of modern cryptography is the Electronic Code Book (ECB). Electronic Code Book (ECB) is a modern cryptographic method used to encrypt and decrypt text, images and more. The image is formed from several pixels which consist of several bits in a pixel. Bits are divided into two namely Least Significant Bit (LSB) and Most Significant Bit (MSB).LSB is the four rightmost bits while MSB is the leftmost four bits of a pixel. The purpose of this study is to compare the level of security of Electronic Code Book (ECB) image security results with the results of securing an Electronic Code Book (ECB) modified image. The data used in this study are 8 RGB and Greyscale images also a key in the form of one ASCII character. The results obtained show that securing images with modified Electronic Code Book (ECB) is safer than securing images with Electronic Code Book (ECB) based on histogram analysis, differential analysis and correlation coefficients.
 Keywords: ASCII, Electronic Code Book (ECB), Most Significant Bit (MSB)
APA, Harvard, Vancouver, ISO, and other styles
20

Wright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Wajong, Andre Michael Ricky, and Carolina Rizki Putri. "Keamanan Dalam Electronic Commerce." ComTech: Computer, Mathematics and Engineering Applications 1, no. 2 (2010): 867. http://dx.doi.org/10.21512/comtech.v1i2.2623.

Full text
Abstract:
The objective of this paper is to give information and understanding about security threat that could happen in security system in e-commerce. The approach used is how the transaction system is, how the security is applied, and also the possible security threat in e-commerce. The result of this research is that there are still gaps in e-commerce. It is hoped that the business actors will be more realized about the security importance and more aware about the possible threat.
APA, Harvard, Vancouver, ISO, and other styles
22

Haas, David J. "Electronic Security Screening: Its Origin with Aviation Security 1968–1973." Journal of Applied Security Research 5, no. 4 (2010): 460–532. http://dx.doi.org/10.1080/19361610.2010.505778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gong, Song Jie, and Lin Di Jin. "Research on Electronic Cash Security Technology in Electronic Commerce." Advanced Materials Research 846-847 (November 2013): 1628–31. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1628.

Full text
Abstract:
With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.
APA, Harvard, Vancouver, ISO, and other styles
24

Naserasadi, Ali. "Authors Security in Electronic Learning Systems." International Journal of Computer Applications 21, no. 10 (2011): 25–29. http://dx.doi.org/10.5120/2617-3458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sng, Y. N., C. Quek, and S. Foo. "Security in computational electronic mail systems." Information Services & Use 17, no. 4 (1997): 283–94. http://dx.doi.org/10.3233/isu-1997-17409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. "A Review on Electronic Payments Security." Symmetry 12, no. 8 (2020): 1344. http://dx.doi.org/10.3390/sym12081344.

Full text
Abstract:
Modern technology is turning into an essential element in the financial trade. We focus the emphasis of this review on the research on the E-wallet and online payment, which is an element of an electric payment system, to get the pattern of using this service. This research presents a review of 131 research articles published on electronic payment between 2010 and 2020 that uses a qualitative method of answering the research questions (RQ): RQ1: “What are the major security issues regarding using electronic payments”? and RQ2: “What security properties need to comply for secure electronic payments?” With the systematic literature review approach, the results show that interest in E-wallet and online payment has grown significantly during this period, and it was found that for the increasing uses of electronic payments, researchers are more focused on security issues. The results show that, to conquer the key gaps, electronic payment must have some protection properties, namely, availability, authorization, integrity, non-repudiation, authentication, and confidentiality. Nowadays, security problems in electronic payment are usually more demanding than the present security problems on the web. These findings can enable electric transaction providers to strengthen their security methods by boosting their security gaps, as required for relevant services.
APA, Harvard, Vancouver, ISO, and other styles
27

McClure, Ben. "Can security pierce the electronic veil?" Computers & Security 17, no. 2 (1998): 157. http://dx.doi.org/10.1016/s0167-4048(97)82006-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Liyan. "Security Management of Electronic Reading Room." Procedia Engineering 15 (2011): 5598–600. http://dx.doi.org/10.1016/j.proeng.2011.08.1039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mason, Stephen. "Electronic Security is a Continuous Process." Computer Fraud & Security 2003, no. 1 (2003): 13–15. http://dx.doi.org/10.1016/s1361-3723(03)01013-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dallas, Dennis A. "Electronic Commerce Security on the Internet." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31032.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Labuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.

Full text
Abstract:
The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
32

McCartney, Patricia R. "HIPAA and Electronic Health Information Security." MCN, The American Journal of Maternal/Child Nursing 28, no. 5 (2003): 333. http://dx.doi.org/10.1097/00005721-200309000-00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Jacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Röhrig, Susanne, and Konstantin Knorr. "Security Analysis of Electronic Business Processes." Electronic Commerce Research 4, no. 1/2 (2004): 59–81. http://dx.doi.org/10.1023/b:elec.0000009282.06809.c5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tsai, Flora S. "Security and privacy in electronic passports." International Journal of Biometrics 3, no. 2 (2011): 114. http://dx.doi.org/10.1504/ijbm.2011.039414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rubin, Aviel D. "Security considerations for remote electronic voting." Communications of the ACM 45, no. 12 (2002): 39–44. http://dx.doi.org/10.1145/585597.585599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Suwarjono, Suwarjono, Lilik Sumaryanti, and Lusia Lamalewa. "Cryptography Implementation for electronic voting security." E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.

Full text
Abstract:
Electronic voting is done by recording election data centrally and presenting it into fast digital information. E-voting is an internet technology, which aims to improve the performance of the voting process, and is expected to be a breakthrough in technological development that helps human work. Security constraints in e-voting include the distribution of voting, for example voters who distribute voting rights, are illegitimate and can abuse voters’ rights, because they know the voter’s account to access the system. This study implements cryptographic methods as a password security for voter accounts, and the results of voting, so that the secrecy of the voters’ data and the results of voting are maintained. RSA algorithm to implement cryptographic techniques based on two mathematical problems, namely factorization and modulo operations on composite numbers, which use two different keys for encryption and decryption processes. The public key is used encryption process to encode text, and the private key is used description process, namely translating ciphertext into plaintext.
APA, Harvard, Vancouver, ISO, and other styles
38

Kim, Min Su. "A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era." Jouranl of Information and Security 20, no. 3 (2020): 109–14. http://dx.doi.org/10.33778/kcsa.2020.20.3.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ha, Kyung-Su, Cheol-Kyu Cho, and Pyong-Soo Kim. "Electronic Security Control Center Building Process and Security and Management Measures." Journal of the Korea Society of Computer and Information 20, no. 5 (2015): 113–21. http://dx.doi.org/10.9708/jksci.2015.20.5.113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mostert, Hanri. "Tenure Security Reformand Electronic Registration: Exploring Insights from English Law." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 14, no. 3 (2017): 84. http://dx.doi.org/10.17159/1727-3781/2011/v14i3a2577.

Full text
Abstract:
This paper examines the potential significance of updating registration practices in resolving some of the issues about tenure security in a transformative context. It deals with the importance of good governance in the context of land administration and considers its impact on intended reforms. Land registration practice as an indicator of the quality of governance is scrutinised. The debate about the kinds of interests to be served by tenure security reforms is considered. A comparative law analysis demonstrates how demands for electronification, placed on registration systems, can reshape the process of securing tenure. The paper then highlights issues for further investigation and discussion.
APA, Harvard, Vancouver, ISO, and other styles
41

Q.H., Hasan, Ali A. Yassin, and Oğuz ATA. "Electronic Health Records System Using Blockchain Technology." Webology 18, SI05 (2021): 580–93. http://dx.doi.org/10.14704/web/v18si05/web18248.

Full text
Abstract:
Blockchain technology is one of the most important and disruptive technologies in the world. Nowadays the healthcare center needs to share patient databases over all departments of the healthcare centers. Although, electronic healthcare records overcome several problems compared with manual records, but still suffer from many issues such as security, the privacy of patient data overall as we should transfer over a database from a central database to a decentralized database. In this paper, we proposed a good security system to manage the data of patients based on blockchain technology and a decentralized database. Depending on decentralized database and blockchain. Our proposed system provides the secure exchange of patient data, reliability, and high efficiency in sharing data during transaction data network equivalence checking to perform this validation of patient information in the blockchain and healthcare centers.
APA, Harvard, Vancouver, ISO, and other styles
42

Tarigan, Philipus Tarigan. "Use of Electronic Code Book (Ecb) Algorithm in File Security." Jurnal Info Sains : Informatika dan Sains 10, no. 1 (2020): 19–23. http://dx.doi.org/10.54209/infosains.v10i1.28.

Full text
Abstract:
Electronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contentsElectronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contents
APA, Harvard, Vancouver, ISO, and other styles
43

Singh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.

Full text
Abstract:
Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.
APA, Harvard, Vancouver, ISO, and other styles
44

VYHANIAILO, Svitlana. "Aspects of economic security of electronic commerce." Economics. Finances. Law, no. 4 (April 29, 2021): 28–30. http://dx.doi.org/10.37634/efp.2021.4.5.

Full text
Abstract:
The paper is devoted to the study of the problem of economic security of e-commerce in Ukraine. The tools of economic security implementation that influence the formation of the economic strategy of Ukrainian enterprises, the main activity of which is e-commerce, are considered and analyzed. Measures for effective implementation of tools for determining the degree of security of e-commerce information system are proposed. Identifying new methods of economic security research will help increase economic stability and reduce the vulnerability of Ukrainian enterprises. The purpose of the paper is to determine the process of calculating the security of the e-commerce information system, and to determine the vulnerability of the system. The purpose of the security system as a whole is to identify and prevent dangers and threats, to ensure the security of e-commerce enterprises and to achieve business goals. Determining the degree of security of the e-commerce information system is conducted in two directions: analysis of existing types of technical means of storing and protecting information; and expert assessment of losses from threats. To effectively achieve the economic security of e-commerce, it is necessary to use a variety of techniques and the latest technologies to identify and prevent various sources of threats. This will make it possible to build a system of protection against the violation of the integrity of the economic system. Provide tools to reduce risks and external pressures on the business environment. It will allow to build an effective control system and attract additional control methods. The dynamics of e-commerce development and the degree of its integration into the economy encourage additional research in the direction of reducing risks and achieving economic security.
APA, Harvard, Vancouver, ISO, and other styles
45

Win, Khin Than. "A Review of Security of Electronic Health Records." Health Information Management 34, no. 1 (2005): 13–18. http://dx.doi.org/10.1177/183335830503400105.

Full text
Abstract:
The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.
APA, Harvard, Vancouver, ISO, and other styles
46

Rauf, Sarwat, Inayat Kalim, and Muhammad Mubeen. "Impact of Electronic Media on Pakistan’s Security." Global Social Sciences Review III, no. I (2018): 434–46. http://dx.doi.org/10.31703/gssr.2018(iii-i).25.

Full text
Abstract:
To control the mindset of any society, media plays an important role due to its ability to transfer information and thereby transform societies. Electronic media which thrives on conspiracies, has not lost its importance and TV is still a popular means of communication. By virtue of technological innovations, electronic media has a vast impact on all segments of society (exposure to modern technology and becoming vulnerable). In the contemporary world, terrorism is a major security threat in Pakistan. Continuous open electronic media coverage of issues occur with inherent bias. Against this backdrop, the role of media becomes crucial as the media agenda is gradually turning into the public agenda. Electronic media is inherently biases to the opinions of those reporting the situation. Admittedly, media can influence a large chunk of society. Importantly, Pakistan’s private TV channels while giving an insight to the audience, intentionally or unintentionally, may drive a negative mindset and give birth to perceived security threats. This paper attempts to ascertain the complex connection between security and the electronic media and also highlights the negative impacts of media on the security of Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
47

Sharma, Anuradha, Praveen Kumar Misra, and Puneet Misra. "A Security Measure for Electronic Business Applications." International Journal of Computer Applications 102, no. 7 (2014): 12–16. http://dx.doi.org/10.5120/17826-8612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

McNichol, Kathleen S., Marilyn Greenstein, and Todd M. Feinman. "Electronic Commerce: Security, Risk Management and Control." Journal of Risk and Insurance 68, no. 2 (2001): 371. http://dx.doi.org/10.2307/2678109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dessai, Kissan Gauns. "SECURITY ANALYSIS OF CONVENTIONAL/ELECTRONIC SUMMATIVE ASSESSMENTS." International Journal of Advanced Research in Computer Science 9, no. 1 (2018): 155–62. http://dx.doi.org/10.26483/ijarcs.v9i1.5276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kapis, Kosmas. "Security Modeling for Protecting Electronic Patients’ Consent." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 152–65. http://dx.doi.org/10.17781/p002576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography