Search

Your search keyword '"Fushan WEI"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Fushan WEI" Remove constraint Author: "Fushan WEI" Topic computer Remove constraint Topic: computer
42 results on '"Fushan WEI"'

Search Results

1. LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks

2. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

3. An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles

4. CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification

5. Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

6. tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network

7. Model Learning and Model Checking of IPSec Implementations for Internet of Things

8. Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms

9. Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things

10. A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

11. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things

12. Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

13. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

14. A general compiler for password-authenticated group key exchange protocol in the standard model

15. A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing

16. A provably secure password-based anonymous authentication scheme for wireless body area networks

17. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

18. Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage

19. DOAS: Efficient data owner authorized search over encrypted cloud data

20. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

21. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel

22. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

23. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks

24. A Compact Construction for Non-monotonic Online/Offline CP-ABE Scheme

25. Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe

26. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting

27. An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model

28. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

29. Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction

30. Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing

32. Gateway-oriented password-authenticated key exchange protocol in the standard model

33. Analysis and improvement of a new authenticated group key agreement in a mobile environment

34. A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques

35. mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group

36. A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks

37. Gateway-Oriented Password-Authenticated Key Exchange Based on Chameleon Hash Function

38. Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security

39. Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting

40. Formal Analysis and Improvement of Two-Factor Authenticated Key Exchange Protocol

41. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings

42. Anonymous gateway-oriented password-based authenticated key exchange based on RSA

Catalog

Books, media, physical & digital resources