Search

Your search keyword '"Wu, Yongdong"' showing total 101 results

Search Constraints

Start Over You searched for: Author "Wu, Yongdong" Remove constraint Author: "Wu, Yongdong" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
101 results on '"Wu, Yongdong"'

Search Results

1. GI-SMN: Gradient Inversion Attack Against Federated Learning Without Prior Knowledge

2. IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)

3. PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network

4. Multidimensional Context Awareness in Mobile Devices

5. Accountable Trapdoor Sanitizable Signatures

8. No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption

9. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine

10. A Reversible Data Hiding Scheme for JPEG Images

11. Evaluating a Multimedia-Based Tele-Ophthalmology System

12. Improving a Digital Rights Management Scheme for Video Broadcast

14. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM

15. Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme

16. Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes

17. An Attack on SMC-Based Software Protection

18. Preventing Web-Spoofing with Automatic Detecting Security Indicator

21. Efficient Authentication of Electronic Document Workflow

22. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream

23. Batching SSL/TLS Handshake Improved

25. Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

26. Dynamic Access Control for Multi-privileged Group Communications

31. Public Verifiable Private Decision Tree Prediction

32. P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX

33. Provable Related-Key Security of Contracting Feistel Networks

34. Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure

35. An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm

36. Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications

38. On Galois NFSRs Equivalent to Fibonacci Ones

39. LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks

41. A Lattice-Based Fully Dynamic Group Signature Scheme Without NIZK

42. E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS

43. A New Efficient Quantum Digital Signature Scheme for Multi-bit Messages

44. A Distinguisher for RNGs with LFSR Post-processing

45. On the k-Error Linear Complexities of De Bruijn Sequences

46. On the Structure Property of PCR’s Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences

49. Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors

50. CSURF-TWO: CSIDH for the Ratio (2 : 1)

Catalog

Books, media, physical & digital resources