论文列表及评分结果
Optimized Karatsuba squaring on 8-bit AVR processors.
电商所评分:5
Optimal WiMax planning with security considerations.
电商所评分:10
Detecting spam through their Sender Policy Framework records.
电商所评分:5
Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller.
电商所评分:5
MOSKG: countering kernel rootkits with a secure paging mechanism.
电商所评分:8
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
电商所评分:3
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
电商所评分:3
Universally composable issuer-free adaptive oblivious transfer with access policy.
电商所评分:5
Use of Tsallis entropy in detection of SYN flood DoS attacks.
电商所评分:5
A DCT-based privacy-preserving approach for efficient data mining.
电商所评分:10
Dynamic threshold changeable multi-policy secret sharing scheme.
电商所评分:6
Compression and encryption for remote sensing image using chaotic system.
电商所评分:7
Guest Editorial: Special Issue on: WiMAX security and applications.
电商所评分:9
An empirical investigation into path divergences for concolic execution using CREST.
电商所评分:3
New methods for public key cryptosystems based on XTR.
电商所评分:8
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
电商所评分:1
A variant of Baptista's encryption scheme.
电商所评分:1
Efficient revocable certificateless public key encryption with a delegated revocation authority.
电商所评分:1
A key management technique based on elliptic curves for static wireless sensor networks.
电商所评分:2
Secure broadcast in distributed networks with strong adversaries.
电商所评分:4
Identity-based signcryption from lattices.
电商所评分:7
Achieving data privacy on hybrid cloud.
电商所评分:1
An enhanced privacy preserving remote user authentication scheme with provable security.
电商所评分:2
Architecture and protocols of the future European quantum key distribution network.
电商所评分:7
Towards an efficient reputation based hybrid key management architecture for ad hoc networks.
电商所评分:9
Lattice-based multi-use unidirectional proxy re-encryption.
电商所评分:2
On the undetectability of transcoding steganography.
电商所评分:2
A new metric for flow-level filtering of low-rate DDoS attacks.
电商所评分:7
Risk adaptive hybrid RFID access control system.
电商所评分:5
Attribute-based credentials with cryptographic collusion prevention.
电商所评分:6