论文列表及评分结果

Generalisations of NTRU cryptosystem.

电商所评分:8

点击查看评分详情!

Efficient ring signature schemes over NTRU Lattices.

电商所评分:2

点击查看评分详情!

Identity-based schemes for a secured big data and cloud ICT framework in smart grid system.

电商所评分:7

点击查看评分详情!

Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.

电商所评分:6

点击查看评分详情!

Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system".

电商所评分:1

点击查看评分详情!

Reputation trust mechanism under the organizational-based access control model.

电商所评分:8

点击查看评分详情!

The performance cost of preserving data/query privacy using searchable symmetric encryption.

电商所评分:3

点击查看评分详情!

An iris recognition model for secured access to data.

电商所评分:2

点击查看评分详情!

The practice of secure software development in SDLC: an investigation through existing model and a case study.

电商所评分:1

点击查看评分详情!

Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN).

电商所评分:9

点击查看评分详情!

Message mapping and reverse mapping in elliptic curve cryptosystem.

电商所评分:1

点击查看评分详情!

Efficient certificate-based encryption schemes without pairing.

电商所评分:7

点击查看评分详情!

VRS: a values-based reputation system for web services.

电商所评分:10

点击查看评分详情!

Separations in circular security for arbitrary length key cycles, revisited.

电商所评分:9

点击查看评分详情!

Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.

电商所评分:3

点击查看评分详情!

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.

电商所评分:1

点击查看评分详情!

TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites.

电商所评分:3

点击查看评分详情!

DDoS attacks on data plane of software-defined network: are they possible?

电商所评分:2

点击查看评分详情!

A challenge-based trust establishment protocol for peer-to-peer networks.

电商所评分:2

点击查看评分详情!

Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.

电商所评分:4

点击查看评分详情!

A novel extreme learning machine-based cryptography system.

电商所评分:1

点击查看评分详情!

Short lattice signatures with constant-size public keys.

电商所评分:4

点击查看评分详情!

MREA: a minimum resource expenditure node capture attack in wireless sensor networks.

电商所评分:8

点击查看评分详情!

Authentication of spatio-textual similarity join queries in untrusted cloud environments.

电商所评分:4

点击查看评分详情!

Indefinite block ciphering based on variable and great length key.

电商所评分:8

点击查看评分详情!

CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks.

电商所评分:8

点击查看评分详情!

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.

电商所评分:6

点击查看评分详情!

An authenticated encryption based grouping proof protocol for RFID systems.

电商所评分:6

点击查看评分详情!

Security of VoIP traffic over low or limited bandwidth networks.

电商所评分:2

点击查看评分详情!

Attacking the kad network - real world evaluation and high fidelity simulation using DVN.

电商所评分:9

点击查看评分详情!