论文列表及评分结果

A secure chaotic maps-based privacy-protection scheme for multi-server environments.

电商所评分:6

点击查看评分详情!

Efficient identity authentication and encryption technique for high throughput RFID system.

电商所评分:9

点击查看评分详情!

A universal method for realizing non-repudiable provable data possession in cloud storage.

电商所评分:7

点击查看评分详情!

malnets: large-scale malicious networks via compromised wireless access points.

电商所评分:7

点击查看评分详情!

MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing.

电商所评分:3

点击查看评分详情!

Perfect undetectability of network steganography.

电商所评分:4

点击查看评分详情!

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.

电商所评分:10

点击查看评分详情!

Publishing histograms with outliers under data differential privacy.

电商所评分:7

点击查看评分详情!

Identity-based access control for pro-active message's DTN.

电商所评分:4

点击查看评分详情!

Detecting domain-flux botnet based on DNS traffic features in managed network.

电商所评分:7

点击查看评分详情!

Special issue on provable security.

电商所评分:5

点击查看评分详情!

Security and privacy in Internet of things: methods, architectures, and solutions.

电商所评分:4

点击查看评分详情!

Privacy preserving in cloud computing environment.

电商所评分:3

点击查看评分详情!

An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks.

电商所评分:2

点击查看评分详情!

PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks.

电商所评分:9

点击查看评分详情!

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.

电商所评分:2

点击查看评分详情!

Secure principal component analysis in multiple distributed nodes.

电商所评分:10

点击查看评分详情!

A framework of adaptive steganography resisting JPEG compression and detection.

电商所评分:4

点击查看评分详情!

Design and analysis of the covert channel implemented by behaviors of network users.

电商所评分:8

点击查看评分详情!

A recoverable chaos-based fragile watermarking with high PSNR preservation.

电商所评分:9

点击查看评分详情!

Efficient oblivious transfer with adaptive queries in UC framework.

电商所评分:2

点击查看评分详情!

Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hocnetworks.

电商所评分:10

点击查看评分详情!

CP-ABE with outsourced decryption and directionally hidden policy.

电商所评分:5

点击查看评分详情!

A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory.

电商所评分:6

点击查看评分详情!

Anonymous attribute-based proxy re-encryption for access control in cloud computing.

电商所评分:1

点击查看评分详情!

Security in next generation wireless networks.

电商所评分:9

点击查看评分详情!

Robust off-line e-cash scheme with recoverability and anonymity revocation.

电商所评分:1

点击查看评分详情!

Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography.

电商所评分:7

点击查看评分详情!

Towards optimal leakage exploitation rate in template attacks.

电商所评分:2

点击查看评分详情!

Revocable and strongly unforgeable identity-based signature scheme in the standard model.

电商所评分:8

点击查看评分详情!