论文列表及评分结果
Mitigating insider threat in cloud relational databases.
电商所评分:7
Survey of return-oriented programming defense mechanisms.
电商所评分:7
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
电商所评分:6
Quantum-resistance authentication in centralized cognitive radio networks.
电商所评分:9
Security analysis of Khudra: a lightweight block cipher for FPGAs.
电商所评分:6
A data clustering approach to discriminating impersonating devices in Wi-Fi networks.
电商所评分:1
PFX: an essence of authencryption for block-cipher security.
电商所评分:7
Novel secure VPN architectures for LTE backhaul networks.
电商所评分:1
A novel approach for spam email detection based on shifted binary patterns.
电商所评分:2
An Android based new German eID solution for policy making processes.
电商所评分:8
A novel chaos-based encryption algorithm over TCP data packet for secure communication.
电商所评分:3
Root cause diagnosis in error-propagating networks.
电商所评分:9
EPCS: an efficient and privacy-preserving classification service query framework for SVM.
电商所评分:6
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
电商所评分:5
Effectiveness of file-based deduplication in digital forensics.
电商所评分:4
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
电商所评分:3
Internet security meets the IP multimedia subsystem: an overview.
电商所评分:6
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
电商所评分:8
Cryptanalysis of a certificateless aggregate signature scheme.
电商所评分:4
A 3-D hand gesture signature based biometric authentication system for smartphones.
电商所评分:4
Security bootstrapping of mobile ad hoc networks using identity-based cryptography.
电商所评分:8
A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps.
电商所评分:6
Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise.
电商所评分:7
Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts.
电商所评分:5
Color images steganalysis using rgb channel geometric transformation measures.
电商所评分:5
Pitch-based steganography for Speex voice codec.
电商所评分:8
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
电商所评分:7
The impact of key assignment on VANET privacy.
电商所评分:10
DroidScreening: a practical framework for real-world Android malware analysis.
电商所评分:9
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.
电商所评分:3