Search

Your search keyword '"Fushan WEI"' showing total 35 results

Search Constraints

Start Over You searched for: Author "Fushan WEI" Remove constraint Author: "Fushan WEI" Search Limiters Full Text Remove constraint Search Limiters: Full Text
35 results on '"Fushan WEI"'

Search Results

1. GRU-based multi-scenario gait authentication for smartphones

2. A Novel Estimator for TDOA and FDOA Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters

3. On the use of calibration emitters for TDOA source localization in the presence of synchronization clock bias and sensor location errors

4. Model Learning and Model Checking of IPSec Implementations for Internet of Things

5. CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method

6. A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques

7. LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks

8. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

9. CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification

10. Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

11. A Risk Analysis Framework for Social Engineering Attack Based on User Profiling

12. OpenCBD: A Network-Encrypted Unknown Traffic Identification Scheme Based on Open-Set Recognition

13. A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

14. Iterative constrained weighted least squares estimator for TDOA and FDOA positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties

15. Model Learning and Model Checking of IPSec Implementations for Internet of Things

16. Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms

17. Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

18. A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

19. Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

20. A general compiler for password-authenticated group key exchange protocol in the standard model

21. A provably secure password-based anonymous authentication scheme for wireless body area networks

22. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

23. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

24. On the use of calibration emitters for TDOA source localization in the presence of synchronization clock bias and sensor location errors

25. Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage

26. DOAS: Efficient data owner authorized search over encrypted cloud data

27. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

28. Medical image classification based on multi-scale non-negative sparse coding

29. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting

30. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

31. Gateway-oriented password-authenticated key exchange protocol in the standard model

32. A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques

34. Corrigendum to 'Gateway-oriented password-authenticated key exchange protocol in the standard model' [J. Syst. Softw. 85 (March (3)) (2012) 760–768]

35. Anonymous gateway-oriented password-based authenticated key exchange based on RSA

Catalog

Books, media, physical & digital resources