论文列表及评分结果

A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.

电商所评分:5

点击查看评分详情!

GBAAM: group-based access authentication for MTC in LTE networks.

电商所评分:9

点击查看评分详情!

Policy-based communications for 5G mobile with customer edge switching.

电商所评分:9

点击查看评分详情!

Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.

电商所评分:8

点击查看评分详情!

DLLMiner: structural mining for malware detection.

电商所评分:4

点击查看评分详情!

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.

电商所评分:4

点击查看评分详情!

Triple chaotic image scrambling on RGB - a random image encryption approach.

电商所评分:8

点击查看评分详情!

Leakage-resilient certificate-based encryption.

电商所评分:9

点击查看评分详情!

SecIoT: a security framework for the Internet of Things.

电商所评分:1

点击查看评分详情!

Secure prophet address allocation for MANETs.

电商所评分:8

点击查看评分详情!

Fusion: coalesced confidential storage and communication framework for the IoT.

电商所评分:7

点击查看评分详情!

SAFE-CROWD: secure task allocation for collaborative mobile social network.

电商所评分:7

点击查看评分详情!

ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services.

电商所评分:7

点击查看评分详情!

Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.

电商所评分:3

点击查看评分详情!

A dynamic identity-based user authentication scheme for remote login systems.

电商所评分:4

点击查看评分详情!

A changeable personal identification number-based keystroke dynamics authentication system on smart phones.

电商所评分:1

点击查看评分详情!

An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.

电商所评分:1

点击查看评分详情!

Biometric key-binding using lattice masking†.

电商所评分:10

点击查看评分详情!

Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment.

电商所评分:7

点击查看评分详情!

Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset.

电商所评分:5

点击查看评分详情!

Collaborative attacks in WiMAX networks.

电商所评分:5

点击查看评分详情!

LAWRA: a layered wrapper feature selection approach for network attack detection.

电商所评分:10

点击查看评分详情!

An optimization process to identify outliers generated by intrusion detection systems.

电商所评分:2

点击查看评分详情!

First step towards preserving the privacy of cloud-based IDS security policies.

电商所评分:2

点击查看评分详情!

An adaptable and scalable membership management for the iTrust information search and retrieval system.

电商所评分:1

点击查看评分详情!

Efficient revocable identity-based encryption from multilinear maps.

电商所评分:9

点击查看评分详情!

MDE-based image steganography with large embedding capacity.

电商所评分:3

点击查看评分详情!

Security, trust, and resilience of distributed networks and systems.

电商所评分:6

点击查看评分详情!

Auditing overhead, auditing adaptation, and benchmark evaluation in Linux.

电商所评分:3

点击查看评分详情!

FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic.

电商所评分:5

点击查看评分详情!