论文列表及评分结果

Mitigating insider threat in cloud relational databases.

电商所评分:7

点击查看评分详情!

Survey of return-oriented programming defense mechanisms.

电商所评分:7

点击查看评分详情!

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.

电商所评分:6

点击查看评分详情!

Quantum-resistance authentication in centralized cognitive radio networks.

电商所评分:9

点击查看评分详情!

Security analysis of Khudra: a lightweight block cipher for FPGAs.

电商所评分:6

点击查看评分详情!

A data clustering approach to discriminating impersonating devices in Wi-Fi networks.

电商所评分:1

点击查看评分详情!

PFX: an essence of authencryption for block-cipher security.

电商所评分:7

点击查看评分详情!

Novel secure VPN architectures for LTE backhaul networks.

电商所评分:1

点击查看评分详情!

A novel approach for spam email detection based on shifted binary patterns.

电商所评分:2

点击查看评分详情!

An Android based new German eID solution for policy making processes.

电商所评分:8

点击查看评分详情!

A novel chaos-based encryption algorithm over TCP data packet for secure communication.

电商所评分:3

点击查看评分详情!

Root cause diagnosis in error-propagating networks.

电商所评分:9

点击查看评分详情!

EPCS: an efficient and privacy-preserving classification service query framework for SVM.

电商所评分:6

点击查看评分详情!

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.

电商所评分:5

点击查看评分详情!

Effectiveness of file-based deduplication in digital forensics.

电商所评分:4

点击查看评分详情!

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.

电商所评分:3

点击查看评分详情!

Internet security meets the IP multimedia subsystem: an overview.

电商所评分:6

点击查看评分详情!

AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.

电商所评分:8

点击查看评分详情!

Cryptanalysis of a certificateless aggregate signature scheme.

电商所评分:4

点击查看评分详情!

A 3-D hand gesture signature based biometric authentication system for smartphones.

电商所评分:4

点击查看评分详情!

Security bootstrapping of mobile ad hoc networks using identity-based cryptography.

电商所评分:8

点击查看评分详情!

A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps.

电商所评分:6

点击查看评分详情!

Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise.

电商所评分:7

点击查看评分详情!

Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts.

电商所评分:5

点击查看评分详情!

Color images steganalysis using rgb channel geometric transformation measures.

电商所评分:5

点击查看评分详情!

Pitch-based steganography for Speex voice codec.

电商所评分:8

点击查看评分详情!

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.

电商所评分:7

点击查看评分详情!

The impact of key assignment on VANET privacy.

电商所评分:10

点击查看评分详情!

DroidScreening: a practical framework for real-world Android malware analysis.

电商所评分:9

点击查看评分详情!

Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.

电商所评分:3

点击查看评分详情!