Linked e-resources

Details

Invited paper
While Mobile Encounters with Clouds
Authentication Mechanism
Multi-Device Anonymous Authentication
A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
Cloud Computing Security
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments
An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms
Data Mining for Security Application
Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security
Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade
Digital Signature
Two-in-One Oblivious Signatures Secure in the Random Oracle Model
A New Transitive Signature Scheme
Privacy-preserving Technologies
Privacy-Preserving Profile Matching Protocol Considering Conditions
Privacy Preserving Credit Systems
Evading System-Calls Based Intrusion Detection Systems
Network Security and Forensic
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
A Network Timestamp Verification Mechanism for Forensic Analysis
Searchable Encryption
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
A System of Shareable Keyword Search on Encrypted Data
Security Policy and Access Control
An Attribute Based Protection Model for JSON Documents
The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA
Security Protocols
MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
Expressive Rating Scheme by Signatures with Predications on Ratees
Symmetric Key Cryptography
A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR
System Security
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks
Iris Cancellable Template Generation based on Indexing-First-One Hashing
Web Security
Detecting Malicious URLs Using Lexical Analysis
Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo
Data Mining for Security Application (Short Paper)
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
Provable Seucirty (Short Paper)
Improved Security Proofs for Modular Exponentiation Bits
Security Protocol (Short Paper)
Secure Outsourced Bilinear Pairings Computation for Mobile Devices
The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.

Browse Subjects

Show more subjects...

Statistics

from
to
Export