Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 2792 (Search time: 0.012 seconds).

TitleAuthor(s)Issue Date
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
 
Dual-phase just-in-time workflow scheduling in P2P grid systems
Proceeding/Conference:Proceedings of the International Conference on Parallel Processing
2010
 
First look at average-case complexity for planar maximum-likelihood detection
Proceeding/Conference:2005 Fifth International Conference on Information, Communications and Signal Processing
2005
 
IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information
Proceeding/Conference:Lecture Notes in Computer Science
2014
Primal dual gives almost optimal energy efficient online algorithms
Proceeding/Conference:Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms
2014
 
Managing Uncertainty in Big Data
Proceeding/Conference:DI3: International Workshop on Data Integration,Intelligence, and Interoperability for Smart Cities
2019
Augmented feedback in semantic segmentation under image level supervision
Proceeding/Conference:Computer Vision – ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part VIII
2016
 
Privacy-Enhancing Consortium Blockchain
Proceeding/Conference:Second ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC'18)
2018
Fuzzy public-key encryption based on biometric data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
Detecting malicious nodes in medical smartphone networks through euclidean distance-based behavioral profiling
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
Evaluating challenge-based trust mechanism in medical smartphone networks: An empirical study
Proceeding/Conference:2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings
2017
When query authentication meets fine-grained access control: A zero-knowledge approach
Proceeding/Conference:Proceedings of the ACM SIGMOD International Conference on Management of Data
2018
Achieving flexibility for ABE with outsourcing via proxy re-encryption
Proceeding/Conference:ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
2018
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Public-key encryption resilient to linear related-key attacks
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2013
Towards statistical trust computation for medical smartphone networks based on behavioral profiling
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2017
Exploring effect of location number on map-based graphical password authentication
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption
Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019
Blockchain-based threshold electronic voting system
Proceeding/Conference:Communications in Computer and Information Science
2019
Collusion resistant watermarking schemes for cryptographic functionalities
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019
Strongly secure authenticated key exchange from supersingular isogenies
Proceeding/Conference:Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I
2019
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019
Lattice-based universal accumulator with nonmembership arguments
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Practical signatures from the partial fourier recovery problem revisited: A provably-secure and gaussian-distributed construction
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018