Showing results 1 to 20 of 169
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A Dynamic Trust Framework for Opportunistic Mobile Social Networks Journal:IEEE Transactions on Network and Service Management | 2017 | ||
2016 | |||
A survey on the cyber attacks against non-linear state estimation in smart grids Proceeding/Conference:Lecture Notes in Computer Science | 2016 | ||
Accountability in organizations Journal:International Journal of Information and Computer Security | 2007 | ||
An adaptive block truncation coding algorithm for image compression Proceeding/Conference:ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings | 1990 | ||
Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches Journal:Information Processing Letters | 1996 | ||
Anonymous Counting Problem in Trust Level Warning System for VANET Journal:IEEE Transactions on Vehicular Technology | 2019 | ||
Applying forward security and threshold cryptography in ad hoc networks Proceeding/Conference:Proceedings of the International Conference on Wireless Networks, ICWN'04 | 2004 | ||
2009 | |||
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
Authenticated Directed Diffusion Proceeding/Conference:Lecture Notes in Computer Science | 2008 | ||
Automatic online monitoring and data-mining internet forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | ||
Avoid illegal encrypted DRM content sharing with non-transferable re-encryption Proceeding/Conference:International Conference on Communication Technology Proceedings | 2011 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | ||
A cardinalised binary representation for exponentiation Journal:Computers and Mathematics with Applications | 1995 | ||
Chained threshold proxy signature without and with supervision Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008 | 2008 | ||
Checking key integrity efficiently for high-speed quantum key distribution using combinatorial group testing Journal:Optics Communications | 2011 | ||
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud Proceeding/Conference:Conference on Digital Forensics, Security, and Law | 2012 | ||
CoChecker: detecting capability and sensitive data leaks from component chains in android Proceeding/Conference:Lecture Notes in Computer Science | 2014 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 |