论文列表及评分结果

Self-similarity based DDoS attack detection using Hurst parameter.

电商所评分:1

点击查看评分详情!

Enhancing identity trust in cryptographic key management systems for dynamic environments.

电商所评分:4

点击查看评分详情!

Overlay tunneling as a policy tool for defending mobile ad hoc networks.

电商所评分:5

点击查看评分详情!

Share secrets stage by stage with homogeneous linear feedback shift register in the standard model.

电商所评分:2

点击查看评分详情!

Comprehensive analysis of the authentication methods in wireless body area networks.

电商所评分:6

点击查看评分详情!

CCA2 secure public-key encryption scheme tolerating continual leakage attacks.

电商所评分:2

点击查看评分详情!

Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128.

电商所评分:1

点击查看评分详情!

An efficient privacy-preserving aggregation and billing protocol for smart grid.

电商所评分:10

点击查看评分详情!

Cyber security, crime, and forensics of wireless networks and applications.

电商所评分:6

点击查看评分详情!

A survey of IT early warning systems: architectures, challenges, and solutions.

电商所评分:9

点击查看评分详情!

Video inter-frame forgery identification based on the consistency of quotient of MSSIM.

电商所评分:9

点击查看评分详情!

CSP adoption: current status and future prospects.

电商所评分:6

点击查看评分详情!

FineTrust: a fine-grained trust model for peer-to-peer networks.

电商所评分:10

点击查看评分详情!

Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems.

电商所评分:5

点击查看评分详情!

Distributed key generation protocol with a new complaint management strategy.

电商所评分:3

点击查看评分详情!

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.

电商所评分:1

点击查看评分详情!

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.

电商所评分:3

点击查看评分详情!

An enhanced user authentication solution for mobile payment systems using wearables.

电商所评分:2

点击查看评分详情!

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.

电商所评分:1

点击查看评分详情!

Clustering VoIP caller for SPIT identification.

电商所评分:8

点击查看评分详情!

Human behaviour as an aspect of cybersecurity assurance.

电商所评分:7

点击查看评分详情!

Improved hash and transmission method for larger packets in the RADIUS protocol.

电商所评分:9

点击查看评分详情!

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.

电商所评分:5

点击查看评分详情!

SMM rootkit: a new breed of OS independent malware.

电商所评分:8

点击查看评分详情!

A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns.

电商所评分:2

点击查看评分详情!

False alarm reduction in signature-based IDS: game theory approach.

电商所评分:6

点击查看评分详情!

A statistical model for DPA when algorithmic noise is dependent on target.

电商所评分:4

点击查看评分详情!

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.

电商所评分:10

点击查看评分详情!

Threshold attribute-based signcryption and its application to authenticated key agreement.

电商所评分:8

点击查看评分详情!

Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments.

电商所评分:10

点击查看评分详情!