Showing results 1 to 20 of 85
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A survey on the cyber attacks against non-linear state estimation in smart grids Proceeding/Conference:Lecture Notes in Computer Science | 2016 | ||
Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches Journal:Information Processing Letters | 1996 | ||
Applying forward security and threshold cryptography in ad hoc networks Proceeding/Conference:Proceedings of the International Conference on Wireless Networks, ICWN'04 | 2004 | ||
2009 | |||
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
Chained threshold proxy signature without and with supervision Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008 | 2008 | ||
CoChecker: detecting capability and sensitive data leaks from component chains in android Proceeding/Conference:Lecture Notes in Computer Science | 2014 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 | ||
Credential-based privacy-preserving power request scheme for smart grid network Proceeding/Conference:Globecom. IEEE Conference and Exhibition | 2011 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | ||
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing Proceeding/Conference:International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN) | 2017 | ||
Data Framing Attacks against Nonlinear State Estimation in Smart Grid Proceeding/Conference:IEEE Globecom Workshops (GC Wkshps) Proceedings | 2015 | ||
Defend against Internet censorship in named data networking Proceeding/Conference:International Conference on Advanced Communication Technology (ICACT) Proceedings | 2016 | ||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | ||
The delegation problem and practical pki-based solutions Proceeding/Conference:ICEIS 2004 - Proceedings of the Sixth International Conference on Enterprise Information Systems | 2004 | ||
Delegation with supervision Journal:Information Sciences | 2007 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | ||
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner Proceeding/Conference:International Conference on Connected Vehicles and Expo (ICCVE) | 2014 | ||
DroidChecker: analyzing Android applications for capability leak Proceeding/Conference:Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12 | 2012 | ||
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 |