Search

Your search keyword '"Li, Yingjiu"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Li, Yingjiu" Remove constraint Author: "Li, Yingjiu" Publisher springer nature Remove constraint Publisher: springer nature
41 results on '"Li, Yingjiu"'

Search Results

8. FrontMatter.

11. On RFID False Authentications.

19. Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.

20. Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.

21. Revisiting Unpredictability-Based RFID Privacy Models.

22. A New Framework for RFID Privacy.

23. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.

24. A Robust Damage Assessment Model for Corrupted Database Systems.

25. Self-enforcing Private Inference Control.

26. A Security and Performance Evaluation of Hash-Based RFID Protocols.

27. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.

28. Insights into Malware Detection and Prevention on Mobile Phones.

29. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.

30. Database Watermarking: A Systematic View.

31. Disclosure Analysis and Control in Statistical Databases.

32. New Paradigm of Inference Control with Trusted Computing.

33. Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).

34. Auditing Interval-Based Inference.

35. Disclosure Analysis for Two-Way Contingency Tables.

36. A Novel RFID Tag Identification Protocol: Adaptive $$n$$ -Resolution and $$k$$ -Collision Arbitration.

37. Risk balance defense approach against intrusions for network server.

38. Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.

39. Protecting business intelligence and customer privacy while outsourcing data mining tasks.

40. Preserving privacy in association rule mining with bloom filters.

41. Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.

Catalog

Books, media, physical & digital resources