论文列表及评分结果

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.

电商所评分:6

点击查看评分详情!

K-anonymity against neighborhood attacks in weighted social networks.

电商所评分:8

点击查看评分详情!

Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.

电商所评分:2

点击查看评分详情!

A novel bit scalable leakage model based on genetic algorithm.

电商所评分:7

点击查看评分详情!

A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.

电商所评分:6

点击查看评分详情!

A robust self-organized public key management for mobile ad hoc networks.

电商所评分:1

点击查看评分详情!

A pragmatic approach towards secure sharing of digital objects.

电商所评分:7

点击查看评分详情!

SmartPass: a smarter geolocation-based authentication scheme.

电商所评分:9

点击查看评分详情!

IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes.

电商所评分:4

点击查看评分详情!

Cooperative security management for broadband network environments.

电商所评分:4

点击查看评分详情!

Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.

电商所评分:7

点击查看评分详情!

Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks.

电商所评分:4

点击查看评分详情!

Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique.

电商所评分:8

点击查看评分详情!

Efficient verifiable data streaming.

电商所评分:6

点击查看评分详情!

Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor.

电商所评分:8

点击查看评分详情!

Attacks and improvements to chaotic map-based RFID authentication protocol.

电商所评分:10

点击查看评分详情!

Swarm intelligence based key generation for stream cipher.

电商所评分:6

点击查看评分详情!

On the evaluation of reputation and trust-based schemes in mobile ad hoc networks.

电商所评分:9

点击查看评分详情!

Security analysis of a homomorphic signature scheme for network coding.

电商所评分:7

点击查看评分详情!

Privacy-preserving authorization method for mashups.

电商所评分:8

点击查看评分详情!

Some security results of the RC4+ stream cipher.

电商所评分:7

点击查看评分详情!

An authentication strategy based on spatiotemporal chaos for software copyright protection.

电商所评分:10

点击查看评分详情!

Under-sampling spectrum-sparse signals based on active aliasing for low probability detection.

电商所评分:1

点击查看评分详情!

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.

电商所评分:3

点击查看评分详情!

TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks.

电商所评分:2

点击查看评分详情!

A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).

电商所评分:2

点击查看评分详情!

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.

电商所评分:2

点击查看评分详情!

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.

电商所评分:5

点击查看评分详情!

Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption.

电商所评分:10

点击查看评分详情!

Security in big data.

电商所评分:2

点击查看评分详情!