论文列表及评分结果
A secure chaotic maps-based privacy-protection scheme for multi-server environments.
电商所评分:6
Efficient identity authentication and encryption technique for high throughput RFID system.
电商所评分:9
A universal method for realizing non-repudiable provable data possession in cloud storage.
电商所评分:7
malnets: large-scale malicious networks via compromised wireless access points.
电商所评分:7
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing.
电商所评分:3
Perfect undetectability of network steganography.
电商所评分:4
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
电商所评分:10
Publishing histograms with outliers under data differential privacy.
电商所评分:7
Identity-based access control for pro-active message's DTN.
电商所评分:4
Detecting domain-flux botnet based on DNS traffic features in managed network.
电商所评分:7
Special issue on provable security.
电商所评分:5
Security and privacy in Internet of things: methods, architectures, and solutions.
电商所评分:4
Privacy preserving in cloud computing environment.
电商所评分:3
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks.
电商所评分:2
PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks.
电商所评分:9
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
电商所评分:2
Secure principal component analysis in multiple distributed nodes.
电商所评分:10
A framework of adaptive steganography resisting JPEG compression and detection.
电商所评分:4
Design and analysis of the covert channel implemented by behaviors of network users.
电商所评分:8
A recoverable chaos-based fragile watermarking with high PSNR preservation.
电商所评分:9
Efficient oblivious transfer with adaptive queries in UC framework.
电商所评分:2
Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hocnetworks.
电商所评分:10
CP-ABE with outsourced decryption and directionally hidden policy.
电商所评分:5
A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory.
电商所评分:6
Anonymous attribute-based proxy re-encryption for access control in cloud computing.
电商所评分:1
Security in next generation wireless networks.
电商所评分:9
Robust off-line e-cash scheme with recoverability and anonymity revocation.
电商所评分:1
Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography.
电商所评分:7
Towards optimal leakage exploitation rate in template attacks.
电商所评分:2
Revocable and strongly unforgeable identity-based signature scheme in the standard model.
电商所评分:8