Showing results 1 to 19 of 19
Title | Author(s) | Issue Date | |
---|---|---|---|
Antitumor agents 294. Novel E-ring-modified camptothecin-4β-anilino- 4′-O-demethyl-epipodophyllotoxin conjugates as DNA topoisomerase i inhibitors and cytotoxic agents Journal:Bioorganic and Medicinal Chemistry | 2012 | ||
Checking key integrity efficiently for high-speed quantum key distribution using combinatorial group testing Journal:Optics Communications | 2011 | ||
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 | ||
Efficient key integrity verification for quantum cryptography using combinatorial group testing Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2010 | ||
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing Journal:International Journal of Digital Content Technology and its Applications | 2011 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Hard disk integrity check by hashing with combinatorial group testing Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
Improving disk sector integrity using 3-dimension hashing scheme Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings | 2007 | ||
K-Dimensional hashing scheme for hard disk integrity verification in computer forensics Journal:Journal of Zhejiang University: Science C | 2011 | ||
A key-recovery system for long-term encrypted documents Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006 | 2006 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
2019 | |||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating Journal:Journal of Network and Computer Applications | 2018 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | ||
Secure chained threshold proxy signature without and with supervision Journal:Journal of Software Engineering and Applications | 2009 | ||
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing | 2017 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
SPECS: Secure and privacy enhancing communications schemes for VANETs Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2010 |