Showing results 1 to 14 of 14
Title | Author(s) | Issue Date | |
---|---|---|---|
Checking key integrity efficiently for high-speed quantum key distribution using combinatorial group testing Journal:Optics Communications | 2011 | ||
A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem Journal:International Journal of Digital Content Technology and its Applications (JDCTA) | 2012 | ||
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 | ||
Efficient key integrity verification for quantum cryptography using combinatorial group testing Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2010 | ||
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing Journal:International Journal of Digital Content Technology and its Applications | 2011 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
Hard disk integrity check by hashing with combinatorial group testing Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design Journal:Quantum Information Processing | 2014 | ||
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering | 2012 | ||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography Proceeding/Conference:Lecture Notes in Engineering and Computer Science | 2013 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 |