Browsing by Author rp00120

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 169  next >
TitleAuthor(s)Issue Date
 
A Dynamic Trust Framework for Opportunistic Mobile Social Networks
Journal:IEEE Transactions on Network and Service Management
2017
 
2016
A survey on the cyber attacks against non-linear state estimation in smart grids
Proceeding/Conference:Lecture Notes in Computer Science
2016
 
Accountability in organizations
Journal:International Journal of Information and Computer Security
2007
An adaptive block truncation coding algorithm for image compression
Proceeding/Conference:ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
1990
 
1996
 
Anonymous Counting Problem in Trust Level Warning System for VANET
Journal:IEEE Transactions on Vehicular Technology
2019
Applying forward security and threshold cryptography in ad hoc networks
Proceeding/Conference:Proceedings of the International Conference on Wireless Networks, ICWN'04
2004
 
2009
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
Authenticated Directed Diffusion
Proceeding/Conference:Lecture Notes in Computer Science
2008
Automatic online monitoring and data-mining internet forums
Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
Avoid illegal encrypted DRM content sharing with non-transferable re-encryption
Proceeding/Conference:International Conference on Communication Technology Proceedings
2011
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
 
A cardinalised binary representation for exponentiation
Journal:Computers and Mathematics with Applications
1995
Chained threshold proxy signature without and with supervision
Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008
2008
 
2011
 
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud
Proceeding/Conference:Conference on Digital Forensics, Security, and Law
2012
2014
 
2004