论文列表及评分结果
Reputation management in collaborative computing systems.
电商所评分:4
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.
电商所评分:2
Reliable relay-based broadcasting through formal concept analysis for WSNs.
电商所评分:10
Binary field multiplication on ARMv8.
电商所评分:4
Time-bound key-aggregate encryption for cloud storage.
电商所评分:9
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
电商所评分:1
On the estimation of the second largest eigenvalue of Markov ciphers.
电商所评分:8
Taming transitive permission attack via bytecode rewriting on Android application.
电商所评分:7
Linear (k, n) secret sharing scheme with cheating detection.
电商所评分:2
Challenges and opportunities in next-generation cyberspace security.
电商所评分:9
Trends in modern information hiding: techniques, applications, and detection.
电商所评分:8
A guide to trust in mobile ad hoc networks.
电商所评分:1
Refined Shacham-Waters ring signature scheme in Seo-Cheon framework.
电商所评分:2
Covert channel-internal control protocols: attacks and defense.
电商所评分:5
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation.
电商所评分:9
Quantitative threat situation assessment based on alert verification.
电商所评分:9
Identity-based key management for cloud computing.
电商所评分:8
Understanding a prospective approach to designing malicious social bots.
电商所评分:3
Traceback model for identifying sources of distributed attacks in real time.
电商所评分:2
Corrigendum to "New Rational Parties Relying on Reputation".
电商所评分:10
PSO-based optimal peer selection approach for highly secure and trusted P2P system.
电商所评分:3
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
电商所评分:5
Interoperable semantic access control for highly dynamic coalitions.
电商所评分:4
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
电商所评分:4
Security and networking for cyber-physical systems.
电商所评分:10
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
电商所评分:8
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework.
电商所评分:7
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.
电商所评分:10
Attribution in cyberspace: techniques and legal implications.
电商所评分:2
Outsourcing secure two-party computation as a black box.
电商所评分:6