论文列表及评分结果

Optimized Karatsuba squaring on 8-bit AVR processors.

电商所评分:5

点击查看评分详情!

Optimal WiMax planning with security considerations.

电商所评分:10

点击查看评分详情!

Detecting spam through their Sender Policy Framework records.

电商所评分:5

点击查看评分详情!

Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller.

电商所评分:5

点击查看评分详情!

MOSKG: countering kernel rootkits with a secure paging mechanism.

电商所评分:8

点击查看评分详情!

A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.

电商所评分:3

点击查看评分详情!

Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.

电商所评分:3

点击查看评分详情!

Universally composable issuer-free adaptive oblivious transfer with access policy.

电商所评分:5

点击查看评分详情!

Use of Tsallis entropy in detection of SYN flood DoS attacks.

电商所评分:5

点击查看评分详情!

A DCT-based privacy-preserving approach for efficient data mining.

电商所评分:10

点击查看评分详情!

Dynamic threshold changeable multi-policy secret sharing scheme.

电商所评分:6

点击查看评分详情!

Compression and encryption for remote sensing image using chaotic system.

电商所评分:7

点击查看评分详情!

Guest Editorial: Special Issue on: WiMAX security and applications.

电商所评分:9

点击查看评分详情!

An empirical investigation into path divergences for concolic execution using CREST.

电商所评分:3

点击查看评分详情!

New methods for public key cryptosystems based on XTR.

电商所评分:8

点击查看评分详情!

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.

电商所评分:1

点击查看评分详情!

A variant of Baptista's encryption scheme.

电商所评分:1

点击查看评分详情!

Efficient revocable certificateless public key encryption with a delegated revocation authority.

电商所评分:1

点击查看评分详情!

A key management technique based on elliptic curves for static wireless sensor networks.

电商所评分:2

点击查看评分详情!

Secure broadcast in distributed networks with strong adversaries.

电商所评分:4

点击查看评分详情!

Identity-based signcryption from lattices.

电商所评分:7

点击查看评分详情!

Achieving data privacy on hybrid cloud.

电商所评分:1

点击查看评分详情!

An enhanced privacy preserving remote user authentication scheme with provable security.

电商所评分:2

点击查看评分详情!

Architecture and protocols of the future European quantum key distribution network.

电商所评分:7

点击查看评分详情!

Towards an efficient reputation based hybrid key management architecture for ad hoc networks.

电商所评分:9

点击查看评分详情!

Lattice-based multi-use unidirectional proxy re-encryption.

电商所评分:2

点击查看评分详情!

On the undetectability of transcoding steganography.

电商所评分:2

点击查看评分详情!

A new metric for flow-level filtering of low-rate DDoS attacks.

电商所评分:7

点击查看评分详情!

Risk adaptive hybrid RFID access control system.

电商所评分:5

点击查看评分详情!

Attribute-based credentials with cryptographic collusion prevention.

电商所评分:6

点击查看评分详情!