Search

Your search keyword '"Li, Yingjiu"' showing total 29 results

Search Constraints

Start Over You searched for: Author "Li, Yingjiu" Remove constraint Author: "Li, Yingjiu" Journal security and privacy in communication networks : 14th international conference, securecomm 2018, singapore, singapore, august 8-10, 2018, proceedings, part ii Remove constraint Journal: security and privacy in communication networks : 14th international conference, securecomm 2018, singapore, singapore, august 8-10, 2018, proceedings, part ii
29 results on '"Li, Yingjiu"'

Search Results

1. A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation

2. A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network

3. Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices

4. What’s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

5. A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design

6. An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations

7. A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding

8. Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism

9. A Survey of Big Data Security Solutions in Healthcare

10. Malware Detection for Healthcare Data Security

11. Secure Communication on NoC Based MPSoC

12. A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications

13. Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution

14. Xilara: An XSS Filter Based on HTML Template Restoration

15. FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale

16. Implementation of High Throughput XTS-SM4 Module for Data Storage Devices

17. Improved Quantum Key Distribution Networks Based on Blom-Scheme

18. Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs

19. Neural Network Based Min-entropy Estimation for Random Number Generators

20. A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet

21. On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name

22. A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

23. SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks

24. Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout

25. Adaptive Deterrence of DNS Cache Poisoning

26. Social Bot Detection Using Tweets Similarity

27. Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain

28. Detecting Suspicious Members in an Online Emotional Support Service

29. A Mobile Botnet That Meets Up at Twitter

Catalog

Books, media, physical & digital resources