论文列表及评分结果

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.

电商所评分:2

点击查看评分详情!

Robust mitigation of selfish misbehavior in wireless networks.

电商所评分:4

点击查看评分详情!

Enhancing the performance and security against media-access-control table overflow vulnerability attacks.

电商所评分:2

点击查看评分详情!

Conference key establishment protocol using a multivariate polynomial and its applications.

电商所评分:7

点击查看评分详情!

Improved conditional differential cryptanalysis.

电商所评分:1

点击查看评分详情!

Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments.

电商所评分:4

点击查看评分详情!

Certificateless online/offline signcryption scheme.

电商所评分:4

点击查看评分详情!

Visualizing web server attacks: patterns in PHPIDS logs‡.

电商所评分:10

点击查看评分详情!

Three-phase behavior-based detection and classification of known and unknown malware.

电商所评分:6

点击查看评分详情!

Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey.

电商所评分:8

点击查看评分详情!

Application of wavelet denoising to improve OFDM-based signal detection and classification.

电商所评分:5

点击查看评分详情!

Real-time audio steganography attack based on automatic objective quality feedback.

电商所评分:7

点击查看评分详情!

Embedded Systems Security: A Survey of EU Research Efforts.

电商所评分:2

点击查看评分详情!

Preserving privacy in a smart grid scenario using quantum mechanics.

电商所评分:6

点击查看评分详情!

Rashnu: a Wi-Fi intrusion response scheme.

电商所评分:5

点击查看评分详情!

Special issue on trust and security in cloud computing.

电商所评分:7

点击查看评分详情!

An effective behavior-based Android malware detection system.

电商所评分:1

点击查看评分详情!

Modelling influence of Botnet features on effectiveness of DDoS attacks.

电商所评分:2

点击查看评分详情!

CAPTCHA and its Alternatives: A Review.

电商所评分:5

点击查看评分详情!

Detection of seam carving-based video retargeting using forensics hash.

电商所评分:2

点击查看评分详情!

Differentially private client-side data deduplication protocol for cloud storage services.

电商所评分:1

点击查看评分详情!

A secure and resistant architecture against attacks for mobile ad hoc networks.

电商所评分:10

点击查看评分详情!

New method of key-dependent message security for asymmetric encryption.

电商所评分:7

点击查看评分详情!

Weaknesses of fingerprint-based mutual authentication protocol.

电商所评分:3

点击查看评分详情!

A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.

电商所评分:6

点击查看评分详情!

A collusion attack on asymmetric group key exchange.

电商所评分:10

点击查看评分详情!

New packing method in somewhat homomorphic encryption and its applications.

电商所评分:2

点击查看评分详情!

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.

电商所评分:1

点击查看评分详情!

Certificateless aggregate signature with efficient verification.

电商所评分:6

点击查看评分详情!

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.

电商所评分:5

点击查看评分详情!