Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 331 (Search time: 0.028 seconds).

TitleAuthor(s)Issue DateViews
 
2017
63
 
2019
 
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing
Journal:International Journal of Digital Content Technology and its Applications
2011
Role activation management in role based access control
Proceeding/Conference:Lecture Notes in Computer Science
2005
111
 
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence
Journal:IEEE/ACM Transactions on Computational Biology and Bioinformatics
2012
40
 
Providing distributed certificate authority service in mobile ad hoc networks
Proceeding/Conference:Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
2005
215
 
2008
121
 
2012
165
 
Delegation with supervision
Journal:Information Sciences
2007
141
Related randomness attacks for public key crypto systems
Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
2015
Chained threshold proxy signature without and with supervision
Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008
2008
 
2007
210
A key-recovery system for long-term encrypted documents
Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006
2006
127
Secure role activation and authorization in the enterprise environment
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
117
 
2012
 
2005
122
 
Finding Linear Motif Pair from Protein Interaction Networks: A Probabilistic Approach
Proceeding/Conference:The 6th Annual International Conference on Computational Systems Bioinformatics Conference (CSB 2007)
2007
86
 
Forward-secure multisignature and blind signature schemes
Journal:Applied Mathematics and Computation
2005
411
 
Automatic Construction of Online Catalog Topologies Using Decision Trees
Proceeding/Conference:2nd International Conference on Electronic Commerce and Web Technologies (EC-Web 2001)
2001
94
 
High throughput short read alignment via bi-directional BWT
Proceeding/Conference:Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2009
2009
200
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
110
Adaptive phenotype testing for AND/OR items
Proceeding/Conference:Lecture Notes In Computer Science
2011
117
A Forensic Logging System for Siemens Programmable Logic Controllers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2018
65
 
Secure Query Processing with Data Interoperability in a Cloud Database Environment
Proceeding/Conference:Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
2014
70
Towards a better similarity measure for keyword profiling via clustering
Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings
2013
44