Search

Showing total 229 results
229 results

Search Results

1. Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance.

2. Open source software security vulnerability detection based on dynamic behavior features.

3. Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.

4. A novel method for linguistic steganography by English translation using attention mechanism and probability distribution theory.

5. Self-recovery reversible image watermarking algorithm.

6. On the security of consumer wearable devices in the Internet of Things.

7. Protection of Location Privacy Based on Distributed Collaborative Recommendations.

8. Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls.

9. Design of a BIST implemented AES crypto-processor ASIC.

10. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

11. Obfuscating encrypted threshold signature algorithm and its applications in cloud computing.

12. Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy.

13. Reversible data hiding techniques with high message embedding capacity in images.

14. An efficient and adaptive data-hiding scheme based on secure random matrix.

15. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

16. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

17. LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.

18. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

19. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

20. Complex Generalized Synchronization and Parameter Identification of Nonidentical Nonlinear Complex Systems.

21. FOPBIE: Multi-image cipher based on the random walk of fleet of pawns on the large hypothetical chessboard and chaotic system.

22. Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.

23. PPCD: Privacy-preserving clinical decision with cloud support.

24. High capacity reversible data hiding with interpolation and adaptive embedding.

25. An efficient heterogeneous signcryption for smart grid.

26. A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems.

27. A short certificateless aggregate signature against coalition attacks.

28. A novel image encryption scheme based on quantum dynamical spinning and rotations.

29. The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data.

30. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems.

31. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme.

32. Evolutionary dynamics of cryptocurrency transaction networks: An empirical study.

33. Walking along the road with anonymous users in similar attributes.

34. System steganalysis with automatic fingerprint extraction.

35. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

36. Anonymity-preserving Reputation Management System for health sector.

37. A novel encryption scheme for high-contrast image data in the Fresnelet domain.

38. Revocable identity-based proxy re-signature against signing key exposure.

39. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.

40. An improved anonymous authentication scheme for roaming in ubiquitous networks.

41. Compact FPGA hardware architecture for public key encryption in embedded devices.

42. A digital memories based user authentication scheme with privacy preservation.

43. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

44. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

45. Exchanging registered users' submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks.

46. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

47. Provably secure identity-based identification and signature schemes from code assumptions.

48. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

49. : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain.

50. Does Internet voting make elections less social? Group voting patterns in Estonian e-voting log files (2013–2015).