101 results on '"Wu, Yongdong"'
Search Results
2. IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)
3. PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
4. Multidimensional Context Awareness in Mobile Devices
5. Accountable Trapdoor Sanitizable Signatures
6. Enhancing the Security of On-line Transactions with CAPTCHA Keyboard
7. Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach
8. No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption
9. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
10. A Reversible Data Hiding Scheme for JPEG Images
11. Evaluating a Multimedia-Based Tele-Ophthalmology System
12. Improving a Digital Rights Management Scheme for Video Broadcast
13. Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
14. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
15. Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
16. Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
17. An Attack on SMC-Based Software Protection
18. Preventing Web-Spoofing with Automatic Detecting Security Indicator
19. Protecting Group Dynamic Information in Large Scale Multicast Groups
20. Secure Human Communications Based on Biometrics Signals
21. Efficient Authentication of Electronic Document Workflow
22. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
23. Batching SSL/TLS Handshake Improved
24. Securing JPEG2000 Code-Streams
25. Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
26. Dynamic Access Control for Multi-privileged Group Communications
27. Trust on Web Browser: Attack vs. Defense
28. Zero-Distortion Authentication Watermarking
29. Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
30. Efficient Object-Based Stream Authentication
31. Public Verifiable Private Decision Tree Prediction
32. P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX
33. Provable Related-Key Security of Contracting Feistel Networks
34. Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure
35. An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm
36. Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications
37. Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles
38. On Galois NFSRs Equivalent to Fibonacci Ones
39. LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks
40. An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster
41. A Lattice-Based Fully Dynamic Group Signature Scheme Without NIZK
42. E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS
43. A New Efficient Quantum Digital Signature Scheme for Multi-bit Messages
44. A Distinguisher for RNGs with LFSR Post-processing
45. On the k-Error Linear Complexities of De Bruijn Sequences
46. On the Structure Property of PCR’s Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences
47. Symmetric 2-Adic Complexity of Ding-Helleseth Generalized Cyclotomic Sequences of Period pq
48. Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach
49. Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors
50. CSURF-TWO: CSIDH for the Ratio (2 : 1)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.