论文列表及评分结果
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
电商所评分:5
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.
电商所评分:5
Identity-based universal re-encryption for mixnets.
电商所评分:8
3S: three-signature path authentication for BGP security.
电商所评分:8
A static heuristic approach to detecting malware targets.
电商所评分:2
Privacy preserving smartcard-based authentication system with provable security.
电商所评分:8
An efficient random key distribution scheme for large-scale distributed sensor networks.
电商所评分:4
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
电商所评分:6
Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators.
电商所评分:5
Signcryption KEM/tag-KEM, revisited.
电商所评分:7
A novel weighted threshold secret image sharing scheme†.
电商所评分:10
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
电商所评分:9
An efficient and tunable matrix-disguising method toward privacy-preserving computation.
电商所评分:3
Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching.
电商所评分:8
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
电商所评分:2
User authentication scheme preserving anonymity for ubiquitous devices.
电商所评分:3
Group authenticated key exchange schemes via learning with errors.
电商所评分:9
Efficient rekeying algorithms for WiMAX networks.
电商所评分:6
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
电商所评分:2
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
电商所评分:1
BAFi: a practical cryptographic secure audit logging scheme for digital forensics.
电商所评分:7
A security and trust framework for virtualized networks and software-defined networking.
电商所评分:4
Deciphering privacy leakage in microblogging social networks: a measurement study.
电商所评分:10
Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud.
电商所评分:4
A biometrics and smart cards-based authentication scheme for multi-server environments.
电商所评分:2
Anomaly detection based on efficient Euclidean projection.
电商所评分:5
A static Android malicious code detection method based on multi-source fusion.
电商所评分:10
A comprehensive fault-tolerant framework for wireless sensor networks.
电商所评分:3
Key challenges in securing WiMAX mesh networks.
电商所评分:6
Vulnerabilities of an ECC-based RFID authentication scheme.
电商所评分:8