论文列表及评分结果
Generalisations of NTRU cryptosystem.
电商所评分:8
Efficient ring signature schemes over NTRU Lattices.
电商所评分:2
Identity-based schemes for a secured big data and cloud ICT framework in smart grid system.
电商所评分:7
Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.
电商所评分:6
Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system".
电商所评分:1
Reputation trust mechanism under the organizational-based access control model.
电商所评分:8
The performance cost of preserving data/query privacy using searchable symmetric encryption.
电商所评分:3
An iris recognition model for secured access to data.
电商所评分:2
The practice of secure software development in SDLC: an investigation through existing model and a case study.
电商所评分:1
Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN).
电商所评分:9
Message mapping and reverse mapping in elliptic curve cryptosystem.
电商所评分:1
Efficient certificate-based encryption schemes without pairing.
电商所评分:7
VRS: a values-based reputation system for web services.
电商所评分:10
Separations in circular security for arbitrary length key cycles, revisited.
电商所评分:9
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
电商所评分:3
Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
电商所评分:1
TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites.
电商所评分:3
DDoS attacks on data plane of software-defined network: are they possible?
电商所评分:2
A challenge-based trust establishment protocol for peer-to-peer networks.
电商所评分:2
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
电商所评分:4
A novel extreme learning machine-based cryptography system.
电商所评分:1
Short lattice signatures with constant-size public keys.
电商所评分:4
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
电商所评分:8
Authentication of spatio-textual similarity join queries in untrusted cloud environments.
电商所评分:4
Indefinite block ciphering based on variable and great length key.
电商所评分:8
CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks.
电商所评分:8
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
电商所评分:6
An authenticated encryption based grouping proof protocol for RFID systems.
电商所评分:6
Security of VoIP traffic over low or limited bandwidth networks.
电商所评分:2
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
电商所评分:9