Search

Your search keyword '"Fushan WEI"' showing total 69 results

Search Constraints

Start Over You searched for: Author "Fushan WEI" Remove constraint Author: "Fushan WEI" Language undetermined Remove constraint Language: undetermined
69 results on '"Fushan WEI"'

Search Results

2. LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks

3. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

5. An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles

6. CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification

7. Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things

8. Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

9. A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

10. A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks

11. Robust Direct position determination against sensor gain and phase errors with the use of calibration sources

12. A Novel Estimator for TDOA and FDOA Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters

15. tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network

16. Iterative constrained weighted least squares estimator for TDOA and FDOA positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties

17. Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things

18. A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

19. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things

20. A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

21. Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

22. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

23. A general compiler for password-authenticated group key exchange protocol in the standard model

24. A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing

25. A provably secure password-based anonymous authentication scheme for wireless body area networks

26. CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method

27. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

28. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

29. On the use of calibration emitters for TDOA source localization in the presence of synchronization clock bias and sensor location errors

30. Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage

31. DOAS: Efficient data owner authorized search over encrypted cloud data

32. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

33. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel

34. Secure and efficient ECC speeding up algorithms for wireless sensor networks

35. Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling

36. Analysis of GLV/GLS Method for Elliptic Curve Scalar Multiplication

37. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

38. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks

39. A Compact Construction for Non-monotonic Online/Offline CP-ABE Scheme

40. An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing

41. E2LSH based multiple kernel approach for object detection

42. Medical image classification based on multi-scale non-negative sparse coding

43. User centric three-factor authentication protocol for cloud-assisted wearable devices

44. Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

45. Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe

46. A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption

47. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting

48. An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model

49. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

50. m

Catalog

Books, media, physical & digital resources