论文列表及评分结果

A clustering approach based on convergence degree chain for wireless sensor networks.

电商所评分:3

点击查看评分详情!

Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET.

电商所评分:8

点击查看评分详情!

A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search.

电商所评分:1

点击查看评分详情!

Combating phishing attacks via brand identity and authorization features.

电商所评分:9

点击查看评分详情!

Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.

电商所评分:4

点击查看评分详情!

Elliptic-curve scalar multiplication algorithm using ZOT structure.

电商所评分:1

点击查看评分详情!

A short and highly efficient identity-based designated verifier proxy signature scheme.

电商所评分:2

点击查看评分详情!

Defense mechanisms against Sybil attack in vehicular ad hoc network.

电商所评分:8

点击查看评分详情!

Misuse patterns in VoIP.

电商所评分:4

点击查看评分详情!

Advances in trusted network computing.

电商所评分:3

点击查看评分详情!

A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.

电商所评分:5

点击查看评分详情!

BotCatch: leveraging signature and behavior for bot detection.

电商所评分:5

点击查看评分详情!

Stateful traffic replay for web application proxies.

电商所评分:1

点击查看评分详情!

Data privacy breach prevention framework for the cloud service.

电商所评分:10

点击查看评分详情!

Mobile cloud computing based privacy protection in location-based information survey applications.

电商所评分:4

点击查看评分详情!

Time synchronization: pivotal element in cloud forensics.

电商所评分:9

点击查看评分详情!

Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.

电商所评分:5

点击查看评分详情!

A dynamic key management scheme for dynamic wireless sensor networks.

电商所评分:6

点击查看评分详情!

Towards efficient deployment of wireless sensor networks.

电商所评分:4

点击查看评分详情!

Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks.

电商所评分:1

点击查看评分详情!

Transactions based secure routing in wireless networks: a cognitive science approach.

电商所评分:4

点击查看评分详情!

Introducing touchstroke: keystroke-based authentication system for smartphones.

电商所评分:4

点击查看评分详情!

Secure publish/subscribe-based certificate status validations in mobile ad hoc networks.

电商所评分:10

点击查看评分详情!

A nonmonotonic modal authorization logic for pervasive computing.

电商所评分:5

点击查看评分详情!

JSOD: JavaScript obfuscation detector.

电商所评分:4

点击查看评分详情!

An enhanced Kerberos protocol with non-interactive zero-knowledge proof.

电商所评分:7

点击查看评分详情!

A practical strongly secure one-round authenticated key exchange protocol without random oracles.

电商所评分:3

点击查看评分详情!

A new method of formalizing anonymity based on protocol composition logic.

电商所评分:4

点击查看评分详情!

Small target detection using morphology and modified Gaussian distance function.

电商所评分:9

点击查看评分详情!

Building a wireless capturing tool for WiFi.

电商所评分:4

点击查看评分详情!