论文列表及评分结果
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
电商所评分:5
GBAAM: group-based access authentication for MTC in LTE networks.
电商所评分:9
Policy-based communications for 5G mobile with customer edge switching.
电商所评分:9
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
电商所评分:8
DLLMiner: structural mining for malware detection.
电商所评分:4
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
电商所评分:4
Triple chaotic image scrambling on RGB - a random image encryption approach.
电商所评分:8
Leakage-resilient certificate-based encryption.
电商所评分:9
SecIoT: a security framework for the Internet of Things.
电商所评分:1
Secure prophet address allocation for MANETs.
电商所评分:8
Fusion: coalesced confidential storage and communication framework for the IoT.
电商所评分:7
SAFE-CROWD: secure task allocation for collaborative mobile social network.
电商所评分:7
ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services.
电商所评分:7
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.
电商所评分:3
A dynamic identity-based user authentication scheme for remote login systems.
电商所评分:4
A changeable personal identification number-based keystroke dynamics authentication system on smart phones.
电商所评分:1
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
电商所评分:1
Biometric key-binding using lattice masking†.
电商所评分:10
Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment.
电商所评分:7
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset.
电商所评分:5
Collaborative attacks in WiMAX networks.
电商所评分:5
LAWRA: a layered wrapper feature selection approach for network attack detection.
电商所评分:10
An optimization process to identify outliers generated by intrusion detection systems.
电商所评分:2
First step towards preserving the privacy of cloud-based IDS security policies.
电商所评分:2
An adaptable and scalable membership management for the iTrust information search and retrieval system.
电商所评分:1
Efficient revocable identity-based encryption from multilinear maps.
电商所评分:9
MDE-based image steganography with large embedding capacity.
电商所评分:3
Security, trust, and resilience of distributed networks and systems.
电商所评分:6
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux.
电商所评分:3
FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic.
电商所评分:5