×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of ijcsdf
Proposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift
13 views
Digital Forensic Trends and Future
76 views
2012 (Vol. 1, No. 4)
29 views
A Framework for Good Corporate Governance and Organisational Learning – An Empirical Study
18 views
Power Amount Analysis: An efficient Means to Reveal the Secrets in Cryptosystems
223 views
Modelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks
222 views
A Survey on Malware Propagation, Analysis, and Detection
228 views
Product Piracy Prevention: Product Counterfeit Detection without Security Labels
222 views
A Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with it
214 views
Game Theory: Trust Model for Common Criteria Certifications & Evaluations
224 views