论文列表及评分结果

FairAccess: a new Blockchain-based access control framework for the Internet of Things.

电商所评分:6

点击查看评分详情!

Efficient private subset computation.

电商所评分:9

点击查看评分详情!

Hybrid pattern matching for trusted intrusion detection.

电商所评分:5

点击查看评分详情!

CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system.

电商所评分:7

点击查看评分详情!

Practical verifiably encrypted signatures based on discrete logarithms.

电商所评分:10

点击查看评分详情!

AH4S: an algorithm of text in text steganography using the structure of omega network.

电商所评分:9

点击查看评分详情!

Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey.

电商所评分:5

点击查看评分详情!

An ultralightweight RFID authentication protocol based on Feistel cipher structure.

电商所评分:8

点击查看评分详情!

SETUP in secret sharing schemes using random values.

电商所评分:3

点击查看评分详情!

Causal knowledge analysis for detecting and modeling multi-step attacks.

电商所评分:10

点击查看评分详情!

Text steganography: a novel character-level embedding algorithm using font attribute.

电商所评分:1

点击查看评分详情!

Connectivity jamming game for physical layer attack in peer to peer networks.

电商所评分:3

点击查看评分详情!

Research Trends in Security and DDoS in SDN.

电商所评分:1

点击查看评分详情!

Enhanced correlation power analysis attack against trusted systems.

电商所评分:9

点击查看评分详情!

Crucial pitfall of DPA Contest V4.2 implementation.

电商所评分:9

点击查看评分详情!

Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.

电商所评分:8

点击查看评分详情!

A generalised wavelet packet-based anonymisation approach for ECG security application.

电商所评分:3

点击查看评分详情!

Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization.

电商所评分:10

点击查看评分详情!

Authenticated encryption: how reordering can impact performance.

电商所评分:10

点击查看评分详情!

Trust aware cooperative routing method for WANETs.

电商所评分:8

点击查看评分详情!

Strong designated verifier signature scheme from lattices in the standard model.

电商所评分:3

点击查看评分详情!

Anatomy of targeted attacks with smart malware.

电商所评分:7

点击查看评分详情!

Publicly verifiable secret sharing scheme and its application with almost optimal information rate.

电商所评分:8

点击查看评分详情!

Enhanced stego block chaining (ESBC) for low bandwidth channels.

电商所评分:9

点击查看评分详情!

Packet-based algorithms for stepping-stone detection with chaff perturbation.

电商所评分:1

点击查看评分详情!

A robust cryptographic-based system for secure data sharing in cloud environments.

电商所评分:6

点击查看评分详情!

A comprehensive investigation of secure location estimation techniques for WSN applications.

电商所评分:9

点击查看评分详情!

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.

电商所评分:3

点击查看评分详情!

Role-based authentication protocol.

电商所评分:9

点击查看评分详情!

DSA-Mesh: a distributed security architecture for wireless mesh networks.

电商所评分:8

点击查看评分详情!