论文列表及评分结果
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
电商所评分:6
K-anonymity against neighborhood attacks in weighted social networks.
电商所评分:8
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
电商所评分:2
A novel bit scalable leakage model based on genetic algorithm.
电商所评分:7
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
电商所评分:6
A robust self-organized public key management for mobile ad hoc networks.
电商所评分:1
A pragmatic approach towards secure sharing of digital objects.
电商所评分:7
SmartPass: a smarter geolocation-based authentication scheme.
电商所评分:9
IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes.
电商所评分:4
Cooperative security management for broadband network environments.
电商所评分:4
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
电商所评分:7
Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks.
电商所评分:4
Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique.
电商所评分:8
Efficient verifiable data streaming.
电商所评分:6
Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor.
电商所评分:8
Attacks and improvements to chaotic map-based RFID authentication protocol.
电商所评分:10
Swarm intelligence based key generation for stream cipher.
电商所评分:6
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks.
电商所评分:9
Security analysis of a homomorphic signature scheme for network coding.
电商所评分:7
Privacy-preserving authorization method for mashups.
电商所评分:8
Some security results of the RC4+ stream cipher.
电商所评分:7
An authentication strategy based on spatiotemporal chaos for software copyright protection.
电商所评分:10
Under-sampling spectrum-sparse signals based on active aliasing for low probability detection.
电商所评分:1
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
电商所评分:3
TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks.
电商所评分:2
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).
电商所评分:2
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.
电商所评分:2
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
电商所评分:5
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption.
电商所评分:10
Security in big data.
电商所评分:2