Browsing by Author rp00120

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 85  next >
TitleAuthor(s)Issue Date
A survey on the cyber attacks against non-linear state estimation in smart grids
Proceeding/Conference:Lecture Notes in Computer Science
2016
 
1996
Applying forward security and threshold cryptography in ad hoc networks
Proceeding/Conference:Proceedings of the International Conference on Wireless Networks, ICWN'04
2004
 
2009
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
Chained threshold proxy signature without and with supervision
Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008
2008
2014
 
2004
Credential-based privacy-preserving power request scheme for smart grid network
Proceeding/Conference:Globecom. IEEE Conference and Exhibition
2011
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
 
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing
Proceeding/Conference:International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN)
2017
 
Data Framing Attacks against Nonlinear State Estimation in Smart Grid
Proceeding/Conference:IEEE Globecom Workshops (GC Wkshps) Proceedings
2015
Defend against Internet censorship in named data networking
Proceeding/Conference:International Conference on Advanced Communication Technology (ICACT) Proceedings
2016
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
The delegation problem and practical pki-based solutions
Proceeding/Conference:ICEIS 2004 - Proceedings of the Sixth International Conference on Enterprise Information Systems
2004
 
Delegation with supervision
Journal:Information Sciences
2007
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner
Proceeding/Conference:International Conference on Connected Vehicles and Expo (ICCVE)
2014
DroidChecker: analyzing Android applications for capability leak
Proceeding/Conference:Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12
2012
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011