Journal articles on the topic 'ILLEGITIMATE SERVER'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ILLEGITIMATE SERVER.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (April 26, 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.
Full textRazaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (October 13, 2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.
Full textBrindha, K., and N. Jeyanthi. "Secured Document Sharing Using Visual Cryptography in Cloud Data Storage." Cybernetics and Information Technologies 15, no. 4 (November 1, 2015): 111–23. http://dx.doi.org/10.1515/cait-2015-0058.
Full textChao, Han-Chieh, Hsin-Te Wu, and Fan-Hsun Tseng. "AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing." Sustainability 13, no. 6 (March 10, 2021): 3048. http://dx.doi.org/10.3390/su13063048.
Full textHaruna, Saibu Aliyu, Raphael Olufemi Akinyede, and Boyinbode Olutayo Kehinde. "NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS." MALAYSIAN JOURNAL OF COMPUTING 5, no. 2 (September 9, 2020): 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.
Full textPeriyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Full textRazaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, and Aziz Alotaibi. "Big Data Handling Approach for Unauthorized Cloud Computing Access." Electronics 11, no. 1 (January 3, 2022): 137. http://dx.doi.org/10.3390/electronics11010137.
Full textPurwoleksono, Didik Endro. "THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT." Yuridika 34, no. 1 (January 1, 2019): 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.
Full textLewin, Linda. "Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire: A Methodological Essay." Americas 48, no. 3 (January 1992): 351–96. http://dx.doi.org/10.2307/1007241.
Full textBoulton, S. J., and S. P. Jackson. "Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways." EMBO Journal 15, no. 18 (September 1996): 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.
Full textKerr-Peterson, Miles. "Sir William Keith of Delny: courtier, ambassador and agent of noble power." Innes Review 67, no. 2 (November 2016): 138–58. http://dx.doi.org/10.3366/inr.2016.0124.
Full textSung, Minkyu. "Surveillance and Anti-Communist Authoritarianism in South Korea." Surveillance & Society 15, no. 3/4 (August 9, 2017): 486–90. http://dx.doi.org/10.24908/ss.v15i3/4.6592.
Full textHermann, Adrian. "A Call for a Permissible Plurality Within Theory-Building in a Time of Excess." Method & Theory in the Study of Religion 30, no. 4-5 (October 10, 2018): 487–97. http://dx.doi.org/10.1163/15700682-12341442.
Full textArcadi, James M. "Analytic Theology as Declarative Theology." TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 1, no. 1 (July 19, 2017): 37–52. http://dx.doi.org/10.14428/thl.v1i1.73.
Full textHardecker, David J. K., Marco F. H. Schmidt, and Daniel B. M. Haun. "Developing a Coding System for Sulking Behavior in Young Children." SAGE Open 11, no. 3 (July 2021): 215824402110092. http://dx.doi.org/10.1177/21582440211009223.
Full textGoltermann, Svenja. "Medizin, Recht und das Wissen vom «zivilisierten» Krieg im langen 19. Jahrhundert." Gesnerus 72, no. 2 (November 11, 2015): 215–30. http://dx.doi.org/10.1163/22977953-07202002.
Full textCheung, Andrew K. "Palindrome Regeneration by Template Strand-Switching Mechanism at the Origin of DNA Replication of Porcine Circovirus via the Rolling-Circle Melting-Pot Replication Model." Journal of Virology 78, no. 17 (September 1, 2004): 9016–29. http://dx.doi.org/10.1128/jvi.78.17.9016-9029.2004.
Full textLehnert, Sigrun. "Musik als Mittel der ›Propaganda‹ in der Filmberichterstattung 1950–1965 (West-Ost)." Kieler Beiträge zur Filmmusikforschung 17 (September 4, 2023): 31–60. http://dx.doi.org/10.59056/kbzf.2023.17.p31-60.
Full textPrice, Richard. "A genealogy of the chemical weapons taboo." International Organization 49, no. 1 (1995): 73–103. http://dx.doi.org/10.1017/s0020818300001582.
Full textSalinda, Ma Theresa, Jocelyn Baluyot Hipona, Marivic Ilarde, and Alicia Tuazon. "A Concept Analysis on Culturally Congruent Care." Journal Of Nursing Practice 4, no. 2 (April 1, 2021): 167–76. http://dx.doi.org/10.30994/jnp.v4i2.132.
Full textPanitch, Vida. "Surrogate Tourism and Reproductive Rights." Hypatia 28, no. 2 (2013): 274–89. http://dx.doi.org/10.1111/hypa.12005.
Full textIsles, Mike. "What's in a Word? Falsified/Counterfeit/Fake Medicines - The Definitions Debate." Medicine Access @ Point of Care 1 (January 2017): maapoc.0000008. http://dx.doi.org/10.5301/maapoc.0000008.
Full textFoty, Cherine. "The Dangers of the Dissemination of Misinformation in Implementing the Responsibility to Protect." Journal of International Humanitarian Legal Studies 6, no. 1 (May 4, 2015): 87–117. http://dx.doi.org/10.1163/18781527-00601006.
Full textMoric, Anja. "Peter Klepec: from a (Local) Hero to a (National) Allegory of Weakness." Ars & Humanitas 9, no. 1 (April 30, 2015): 204–26. http://dx.doi.org/10.4312/ars.9.1.204-226.
Full textO'Toole, Tess. "Adoption and the "Improvement of the Estate" in Trollope and Craik." Nineteenth-Century Literature 52, no. 1 (June 1, 1997): 58–79. http://dx.doi.org/10.2307/2934029.
Full textMoric, Anja. "Peter Klepec: from a (Local) Hero to a (National) Allegory of Weakness." Ars & Humanitas 9, no. 1 (April 30, 2015): 204–26. http://dx.doi.org/10.4312/ah.9.1.204-226.
Full textGÜMPLOVÁ, PETRA. "Popular sovereignty over natural resources: A critical reappraisal of Leif Wenar’sBlood Oilfrom the perspective of international law and justice." Global Constitutionalism 7, no. 2 (June 11, 2018): 173–203. http://dx.doi.org/10.1017/s2045381718000114.
Full textNichols, Lizzy. "Becoming Indigenous Again." Environmental Humanities 14, no. 2 (July 1, 2022): 303–20. http://dx.doi.org/10.1215/22011919-9712390.
Full textDuncan, Beatrice Akua. "Cocoa, Marriage, Labour and Land in Ghana: Some Matrilineal and Patrilineal Perspectives." Africa 80, no. 2 (May 2010): 301–21. http://dx.doi.org/10.3366/afr.2010.0206.
Full textDreyer, Frederick. "A “Religious Society under Heaven”: John Wesley and the Identity of Methodism." Journal of British Studies 25, no. 1 (January 1986): 62–83. http://dx.doi.org/10.1086/385854.
Full textSwimelar, Safia. "Deploying images of enemy bodies: US image warfare and strategic narratives." Media, War & Conflict 11, no. 2 (May 1, 2017): 179–203. http://dx.doi.org/10.1177/1750635217700850.
Full textSquires, L. Ashley. "Humble Humbugs and Good Frauds: Harold Frederic, Christian Science, and the Anglo-American Professions." Nineteenth-Century Literature 73, no. 3 (December 1, 2018): 353–78. http://dx.doi.org/10.1525/ncl.2018.73.3.353.
Full textSperling, Stefan. "The Politics of Transparency and Surveillance in Post-Reunification Germany." Surveillance & Society 8, no. 4 (March 24, 2011): 396–412. http://dx.doi.org/10.24908/ss.v8i4.4178.
Full textŠribar, Renata. "Intervention in Science Degradation: Understanding the Work of Stigma." Monitor ISH 19, no. 1 (October 9, 2017): 125–45. http://dx.doi.org/10.33700/1580-7118.19.1.125-145(2017).
Full textAnderson, Neil O., and Peter D. Ascher. "Male and Female Fertility of Loosestrife (Lythrum) Cultivars." Journal of the American Society for Horticultural Science 118, no. 6 (November 1993): 851–58. http://dx.doi.org/10.21273/jashs.118.6.851.
Full textKorobeynikov, Dmitry. "On the Byzantine-Mongol Marriages." ISTORIYA 13, no. 11 (121) (2022): 0. http://dx.doi.org/10.18254/s207987840023180-7.
Full textAldoughli, Rahaf. "Romancing the Nation." Middle East Journal of Culture and Communication 15, no. 4 (November 8, 2022): 427–39. http://dx.doi.org/10.1163/18739865-01504007.
Full textInyang, William Smart, Efiong Eme Joel, Ije Ubana Ubi, Eyo Itam Eyo, Oboh John Ogenyi, and Inyang Ochi Inyang. "Corporate Social Responsibility and Value of Industrial Goods Manufacturing Firms in Nigeria." International Journal of Professional Business Review 8, no. 5 (May 17, 2023): e01870. http://dx.doi.org/10.26668/businessreview/2023.v8i5.1870.
Full textOkpanyi, Vera, Christoph Bartenhagen, Michael Gombert, Sebastian Ginzel, Pina Fanny Ida Krell, Peter Husemann, Cai Chen, et al. "Novel Genomic Structural Variations in Relapsed Childhood ETV6/RUNX1 (TEL/AML1) Acute Lymphoblastic Leukemias Identified by Next Generation Sequencing." Blood 120, no. 21 (November 16, 2012): 518. http://dx.doi.org/10.1182/blood.v120.21.518.518.
Full text"A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 847–51. http://dx.doi.org/10.35940/ijitee.j9039.0881019.
Full textjain, Megha, Suresh Kaswan, and Dhiraj Pandey. "A Blockchain based Fund Management Scheme for Financial Transactions in NGOs." Recent Patents on Engineering 15 (June 15, 2021). http://dx.doi.org/10.2174/1872212115666210615155447.
Full textDean, Jon. "Informal Volunteering, Inequality, and Illegitimacy." Nonprofit and Voluntary Sector Quarterly, July 27, 2021, 089976402110345. http://dx.doi.org/10.1177/08997640211034580.
Full textVan Aarde, Andries. "Jesus' father: The quest for the historical Joseph." HTS Teologiese Studies / Theological Studies 54, no. 1/2 (January 11, 1998). http://dx.doi.org/10.4102/hts.v54i1/2.1410.
Full textLavers, Katie. "Cirque du Soleil and Its Roots in Illegitimate Circus." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.882.
Full text"Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 2880–83. http://dx.doi.org/10.35940/ijitee.j9614.0881019.
Full textHaderer, Margaret. "Does emancipation devour its children? Beyond a stalled dialectic of emancipation." European Journal of Social Theory, July 7, 2021, 136843102110283. http://dx.doi.org/10.1177/13684310211028382.
Full textSILVA, BRUNO CASTANHO, and SVEN-OLIVER PROKSCH. "Fake It ‘Til You Make It: A Natural Experiment to Identify European Politicians’ Benefit from Twitter Bots." American Political Science Review, September 11, 2020, 1–7. http://dx.doi.org/10.1017/s0003055420000817.
Full textCorcione, Elena. "Is There a Role for Domestic Law in the Interpretation of the European Convention on Human Rights?" Italian Review of International and Comparative Law, August 8, 2023, 1–24. http://dx.doi.org/10.1163/27725650-03020001.
Full textStarrs, Bruno. "Hyperlinking History and Illegitimate Imagination: The Historiographic Metafictional E-novel." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.866.
Full textBond, Sue. "Heavy Baggage: Illegitimacy and the Adoptee." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.876.
Full text