Showing results 1 to 10 of 10
Title | Author(s) | Issue Date | |
---|---|---|---|
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 | ||
Efficient key integrity verification for quantum cryptography using combinatorial group testing Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2010 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
Hard disk integrity check by hashing with combinatorial group testing Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering | 2012 | ||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography Proceeding/Conference:Lecture Notes in Engineering and Computer Science | 2013 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 |