论文列表及评分结果
FairAccess: a new Blockchain-based access control framework for the Internet of Things.
电商所评分:6
Efficient private subset computation.
电商所评分:9
Hybrid pattern matching for trusted intrusion detection.
电商所评分:5
CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system.
电商所评分:7
Practical verifiably encrypted signatures based on discrete logarithms.
电商所评分:10
AH4S: an algorithm of text in text steganography using the structure of omega network.
电商所评分:9
Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey.
电商所评分:5
An ultralightweight RFID authentication protocol based on Feistel cipher structure.
电商所评分:8
SETUP in secret sharing schemes using random values.
电商所评分:3
Causal knowledge analysis for detecting and modeling multi-step attacks.
电商所评分:10
Text steganography: a novel character-level embedding algorithm using font attribute.
电商所评分:1
Connectivity jamming game for physical layer attack in peer to peer networks.
电商所评分:3
Research Trends in Security and DDoS in SDN.
电商所评分:1
Enhanced correlation power analysis attack against trusted systems.
电商所评分:9
Crucial pitfall of DPA Contest V4.2 implementation.
电商所评分:9
Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.
电商所评分:8
A generalised wavelet packet-based anonymisation approach for ECG security application.
电商所评分:3
Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization.
电商所评分:10
Authenticated encryption: how reordering can impact performance.
电商所评分:10
Trust aware cooperative routing method for WANETs.
电商所评分:8
Strong designated verifier signature scheme from lattices in the standard model.
电商所评分:3
Anatomy of targeted attacks with smart malware.
电商所评分:7
Publicly verifiable secret sharing scheme and its application with almost optimal information rate.
电商所评分:8
Enhanced stego block chaining (ESBC) for low bandwidth channels.
电商所评分:9
Packet-based algorithms for stepping-stone detection with chaff perturbation.
电商所评分:1
A robust cryptographic-based system for secure data sharing in cloud environments.
电商所评分:6
A comprehensive investigation of secure location estimation techniques for WSN applications.
电商所评分:9
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
电商所评分:3
Role-based authentication protocol.
电商所评分:9
DSA-Mesh: a distributed security architecture for wireless mesh networks.
电商所评分:8