Growing Science » Tags cloud » Security
Authors: Nazifah Husainah, Julinta Paulina, Misrofingah Misrofingah, Indry Aristianto Pradipta, Amalia E. Maulana, Mochammad Fahlevi
DOI: ijdns_2022_166.pdf
Keywords: Perceived Ease of Use, Perceived Usefulness, Trust, Security, Attitude, Intention, Actual Usage, Digital Wallet
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 2491 | Reviews: 0
Authors: Mohammed Alarefi
DOI: 10.5267/j.ijdns.2022.10.004
Keywords: UTAUT, Internet of Things, IoT wearable health device, Technological complexity, Security, Privacy
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 1 | Views: 758 | Reviews: 0
Authors: Sedigheh Ahmadi Fasih
Keywords: Copyright, Digital libraries, Security
Journal: MSL | Year: 2013 | Volume: 3 | Issue: 11 | Views: 2070 | Reviews: 0
Authors: Ali Sepehri-Rad, S.J. Sadjadi, Soheil Sadi-Nezhad
DOI: 10.5267/j.ijdns.2019.1.002
Keywords: Online banking, Parsian bank, Authentication, Security
Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1794 | Reviews: 0
Authors: Zahra Alishahi, Javad Mirabedini, Marjan Kuchaki Rafsanjani
DOI: 10.5267/j.msl.2012.08.018
Keywords: Ad hoc, AODV, MANETs, Packet drop attack, Security
Journal: MSL | Year: 2012 | Volume: 2 | Issue: 7 | Views: 2355 | Reviews: 0
® 2010-2024 GrowingScience.Com