论文列表及评分结果
A clustering approach based on convergence degree chain for wireless sensor networks.
电商所评分:3
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET.
电商所评分:8
A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search.
电商所评分:1
Combating phishing attacks via brand identity and authorization features.
电商所评分:9
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
电商所评分:4
Elliptic-curve scalar multiplication algorithm using ZOT structure.
电商所评分:1
A short and highly efficient identity-based designated verifier proxy signature scheme.
电商所评分:2
Defense mechanisms against Sybil attack in vehicular ad hoc network.
电商所评分:8
Misuse patterns in VoIP.
电商所评分:4
Advances in trusted network computing.
电商所评分:3
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
电商所评分:5
BotCatch: leveraging signature and behavior for bot detection.
电商所评分:5
Stateful traffic replay for web application proxies.
电商所评分:1
Data privacy breach prevention framework for the cloud service.
电商所评分:10
Mobile cloud computing based privacy protection in location-based information survey applications.
电商所评分:4
Time synchronization: pivotal element in cloud forensics.
电商所评分:9
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
电商所评分:5
A dynamic key management scheme for dynamic wireless sensor networks.
电商所评分:6
Towards efficient deployment of wireless sensor networks.
电商所评分:4
Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks.
电商所评分:1
Transactions based secure routing in wireless networks: a cognitive science approach.
电商所评分:4
Introducing touchstroke: keystroke-based authentication system for smartphones.
电商所评分:4
Secure publish/subscribe-based certificate status validations in mobile ad hoc networks.
电商所评分:10
A nonmonotonic modal authorization logic for pervasive computing.
电商所评分:5
JSOD: JavaScript obfuscation detector.
电商所评分:4
An enhanced Kerberos protocol with non-interactive zero-knowledge proof.
电商所评分:7
A practical strongly secure one-round authenticated key exchange protocol without random oracles.
电商所评分:3
A new method of formalizing anonymity based on protocol composition logic.
电商所评分:4
Small target detection using morphology and modified Gaussian distance function.
电商所评分:9
Building a wireless capturing tool for WiFi.
电商所评分:4