论文列表及评分结果

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.

电商所评分:5

点击查看评分详情!

Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.

电商所评分:5

点击查看评分详情!

Identity-based universal re-encryption for mixnets.

电商所评分:8

点击查看评分详情!

3S: three-signature path authentication for BGP security.

电商所评分:8

点击查看评分详情!

A static heuristic approach to detecting malware targets.

电商所评分:2

点击查看评分详情!

Privacy preserving smartcard-based authentication system with provable security.

电商所评分:8

点击查看评分详情!

An efficient random key distribution scheme for large-scale distributed sensor networks.

电商所评分:4

点击查看评分详情!

A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.

电商所评分:6

点击查看评分详情!

Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators.

电商所评分:5

点击查看评分详情!

Signcryption KEM/tag-KEM, revisited.

电商所评分:7

点击查看评分详情!

A novel weighted threshold secret image sharing scheme†.

电商所评分:10

点击查看评分详情!

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.

电商所评分:9

点击查看评分详情!

An efficient and tunable matrix-disguising method toward privacy-preserving computation.

电商所评分:3

点击查看评分详情!

Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching.

电商所评分:8

点击查看评分详情!

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.

电商所评分:2

点击查看评分详情!

User authentication scheme preserving anonymity for ubiquitous devices.

电商所评分:3

点击查看评分详情!

Group authenticated key exchange schemes via learning with errors.

电商所评分:9

点击查看评分详情!

Efficient rekeying algorithms for WiMAX networks.

电商所评分:6

点击查看评分详情!

Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.

电商所评分:2

点击查看评分详情!

A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.

电商所评分:1

点击查看评分详情!

BAFi: a practical cryptographic secure audit logging scheme for digital forensics.

电商所评分:7

点击查看评分详情!

A security and trust framework for virtualized networks and software-defined networking.

电商所评分:4

点击查看评分详情!

Deciphering privacy leakage in microblogging social networks: a measurement study.

电商所评分:10

点击查看评分详情!

Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud.

电商所评分:4

点击查看评分详情!

A biometrics and smart cards-based authentication scheme for multi-server environments.

电商所评分:2

点击查看评分详情!

Anomaly detection based on efficient Euclidean projection.

电商所评分:5

点击查看评分详情!

A static Android malicious code detection method based on multi-source fusion.

电商所评分:10

点击查看评分详情!

A comprehensive fault-tolerant framework for wireless sensor networks.

电商所评分:3

点击查看评分详情!

Key challenges in securing WiMAX mesh networks.

电商所评分:6

点击查看评分详情!

Vulnerabilities of an ECC-based RFID authentication scheme.

电商所评分:8

点击查看评分详情!