Linked e-resources

Details

Privacy and Security Analysis
A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing / Jia-lei Zhang, Ming-sheng Hu, Bei Gong, Zhi-Juan Jia, Li-Peng Wang
Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem / Ya-ge Cheng, Zhi-juan Jia, Bei Gong, Li-peng Wang, Yan-fang Lei
Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability / Jun-Feng Tian, Xuan Jing, Rui-Fang Guo
Research on Big Data Platform Security Based on Cloud Computing / Xiaxia Niu, Yan Zhao
Database Query System with Budget Option for Differential Privacy Against Repeated Attacks / Jingyu Jia, Yuduo Wu, Yue Guo, Jiqiang Gao, Jin Peng, Peng Ran et al.
Research on Social Networks Publishing Method Under Differential Privacy / Han Wang, Shuyu Li
CROSS: Supervised Sharing of Private Data over Blockchains / Mingxin Yin, Jiqiang Gao, Xiaojie Guo, Mengyao Sun, Zheli Liu, Jianzhong Zhang et al.
A Survey of Trusted Network Trust Evaluation Methods / An-Sheng Yin, Shun-Yi Zhang
Anomaly Detection of Vehicle CAN Network Based on Message Content / Xiuliang Mo, Pengyuan Chen, Jianing Wang, Chundong Wang
Android Malware Detection Based on Sensitive Permissions and APIs / Chunhui Zhao, Chundong Wang, Wenbai Zheng
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy / Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu
Privacy Preservation in Publishing Electronic Health Records Based on Perturbation / Lin Yao, Xinyu Wang, Zhenyu Chen, Guowei Wu
Privacy in Location-Based Services: Present Facts and Future Paths / Zakaria Sahnoune, Esma Aïmeur
Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks / Nuhil Mehdy, Casey Kennington, Hoda Mehrpouyan
Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle / Yanan Zhang, Shengqiang Han, Stevenyin Zhong, Peiji Shi, Xuebin Shao
Study on Incident Response System of Automotive Cybersecurity / Yanan Zhang, Peiji Shi, Yangyang Liu, Shengqiang Han, Baoying Mu, Jia Zheng
Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data / Qi Zhang, Shaojing Fu, Nan Jia, Jianchao Tang, Ming Xu
A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation / Xiaohan Yue, Jian Xu, Bing Chen, Yuan He
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on ElGamal / Yong Ding, Huiyong Wang, Zhiqiang Gao, Yujue Wang, Kefeng Fan, Shijie Tang
PJC: A Multi-source Method for Identifying Information Dissemination in Networks / Yong Ding, Xiaoqing Cui, Huiyong Wang, Yujue Wang
Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value / Xiaokang Liu, Hui Tian, Jie Liu, Xiang Li, Jing Lu
Network Risk Assessment Based on Improved MulVAL Framework and HMM / Chundong Wang, Kongbo Li, Yunkun Tian, Xiaonan He
Internet of Things and Cloud Computing
FIREWORK: Fog Orchestration for Secure IoT Networks / Maryam Vahabi, Hossein Fotouhi, Mats Björkman
An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform / Jianchao Tang, Shaojing Fu, Ming Xu
Design of an Urban Waterlogging Monitoring System Based on Internet of Things / Jiachen Liu, Yintu Bao, Yingcong Liu, Wuyungerile Li
A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things / Chuxuan Zhang, Bing Jia, Lifei Hao
FDSCD: Fast Deletion Scheme of Cloud Data / Tong Shao, Yuechi Tian, Zhen Li, Xuan Jing
A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage / Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou
Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain / Jia Wang, Fang Peng, Hui Tian, Wenqi Chen, Jing Lu
Coordinated Web Scan Detection Based on Hierarchical Correlation / Jing Yang, Liming Wang, Zhen Xu, Jigang Wang, Tian Tian
Research on Multi Domain Based Access Control in Intelligent Connected Vehicle / Kaiyu Wang, Nan Liu, Jiapeng Xiu, Zhengqiu Yang
System Building
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity Under Quantum Environment / Zhengjun Jing, Chunsheng Gu, Peizhong Shi
A Design of the Group Decision Making Medical Diagnosis Expert System Based on SED-JD Algorithm / Na Zong, Wuyungerile Li, Pengyu Li, Bing Jia, Xuebin Ma
Design and Implementation of a Lightweight Intrusion Detection and Prevention System / Xiaogang Wei
Reliability Analysis of Coupled Cyber-Physical Systems Under Different Network Types / Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu
Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment / Hao Peng, Zhe Kan, Dandan Zhao, Zhonglong Zheng, Feilong Lin
Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory / Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu
A Blockchain-Based Digital Advertising Media Promotion System / Yong Ding, Decun Luo, Hengkui Xiang, Chenjun Tang, Lingang Liu, Xiuqing Zou et al.
Detecting Steganography in AMR Speech Based on Pulse Correlation / Jie Liu, Hui Tian, Xiaokang Liu, Jing Lu
State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution / Bo Yu, Qiang Yang, CongXi Song
SE Dots: A Sensitive and Extensible Framework for Cross-Region DDoS Processing / Li Su, Meiling Chen, Jin Peng, Peng Ran
Scheme, Model and Application for Data
A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet / Yanfang Lei, Mingsheng Hu, Bei Gong, Lipeng Wang, Yage Cheng
A New Signcryption Scheme Based on Elliptic Curves / Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu, Bei-Gong, Li-peng Wang
A Robust Reversible Watermarking Scheme for Relational Data / Ruitao Hou, Hequn Xian, Xiao Wang, Jing Li
BL-IDS: Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning / Saiyu Hao, Jun Long, Yingchuan Yang
Scheme, Model and Application for Data / An Static Propositional Function Model to Detect Software Vulnerability{Lansheng Han, Man Zhou, Cai Fu
Design of ZigBee-Based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy / Yingcong Liu, Wuyungerile Li, Baoyintu, Bing Jia
Application of Big Data Technology in JD / Ning Shi, Huwei Liu
A Trusted International Settlement Solution Based on Cross Check of CDRs / Peng Ran, Jin Peng, Bo Yang, Li Su, Xiaoyong Hang, Junzhi Yan
Fog-Enabled Smart Campus: Architecture and Challenges / Chaogang Tang, Shixiong Xia, Chong Liu, Xianglin Wei, Yu Bao, Wei Chen
An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing / Jianwei Liu, Xianglin Wei, Tongxiang Wang, Junwei Wang
Mechanism and Method in New Computing
A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market / Lifei Hao, Bing Jia, Chuxuan Zhang
A Reverse Auction Incentive Mechanism Based on the Participant's Behavior in Crowdsensing / Tao Zhou, Bing Jia, Wuyungerile Li
A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure / Yijun Yang, Liji Wu, Ye Yuan, Xiangmin Zhang
Identification and Trust Techniques Compatible with eIDAS Regulation / Stefan Mocanu, Ana Maria Chiriac, Cosmin Popa, Radu Dobrescu, Daniela Saru
Gathering Pattern Mining Method Based on Trajectory Data Stream / Ying Xia, Lian Diao, Xu Zhang, Hae-young Bae
Travel Modes Recognition Method Based on Mobile Phone Signaling Data / Ying Xia, Jie Tang, Xu Zhang, Hae-young Bae
Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection / Chundong Wang, Xin Ye, Xiaonan He, Yunkun Tian, Liangyi Gong
A Novel Wireless Sensor Networks Malicious Node Detection Method / Hongyu Yang, Xugao Zhang, Fang Cheng
Grid Partition and Agglomeration for Bidirectional Hierarchical Clustering / Lei Wu, Hechang Chen, Xiangchun Yu, Sun Chao, Zhezhou Yu, RuiTing Dou
A Non-repudiable Dynamic Provable Data Possession / Jun-Feng Tian, Rui-Fang Guo, Xuan Jing
Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations / Nafees Ahmad, Khalid Iqbal, Lansheng Han,

Naeem Iqbal, Muhammad Adil Abid.

Browse Subjects

Show more subjects...

Statistics

from
to
Export