论文列表及评分结果
Secure the Internet, one home at a time.
电商所评分:4
Secure information sharing for grid computing.
电商所评分:2
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees.
电商所评分:9
ESDR: an efficient and secure data repairing paradigm in cloud storage.
电商所评分:9
Fuzzy certificateless signature.
电商所评分:5
Provably secure user authentication and key agreement scheme for wireless sensor networks.
电商所评分:10
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
电商所评分:5
Reversible data hiding based on prediction error expansion using adjacent pixels.
电商所评分:4
Identity-based key management for wireless sensor networks using lagrange interpolation.
电商所评分:4
Authentication process enhancements in WiMAX networks.
电商所评分:7
An efficient group key agreement protocol for secure P2P communication.
电商所评分:3
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
电商所评分:3
TPM-based protection for mobile agents.
电商所评分:8
Leakage-resilient ID-based signature scheme in the generic bilinear group model.
电商所评分:7
Multi-proxy multi-signature binding positioning protocol.
电商所评分:4
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
电商所评分:6
Generic attack against robust steganography based on spring transform and geometrization.
电商所评分:9
An intelligent three-phase spam filtering method based on decision tree data mining.
电商所评分:6
Service delivery models of cloud computing: security issues and open challenges.
电商所评分:1
Towards a secure hybrid adaptive gateway discovery mechanism for intelligent transportation systems.
电商所评分:6
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
电商所评分:6
Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme.
电商所评分:5
Progressive secret image sharing scheme using meaningful shadows.
电商所评分:3
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
电商所评分:10
SPAM revisited for median filtering detection using higher-order difference.
电商所评分:9
Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
电商所评分:8
Active jamming for multi-user information security improvement with the access statuses of users.
电商所评分:9
Group-oriented encryption for dynamic groups with constant rekeying cost.
电商所评分:4
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
电商所评分:10
Dynamic spectrum access-based cryptosystem for cognitive radio networks.
电商所评分:8