Search

Your search keyword '"Liming Fang"' showing total 74 results

Search Constraints

Start Over You searched for: Author "Liming Fang" Remove constraint Author: "Liming Fang" Topic computer science Remove constraint Topic: computer science
74 results on '"Liming Fang"'

Search Results

1. Revocable Attribute-Based Encryption With Data Integrity in Clouds

2. WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave

3. A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy

4. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds

5. A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices

6. Code Synthesis for Dataflow-Based Embedded Software Design

7. Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

8. ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning

9. Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances

10. A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City

11. A blockchain based decentralized data security mechanism for the Internet of Things

12. A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine

13. A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs

14. A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks

15. Multi-Gigabit over Copper Access Networks: Architectural Evolution and Techno-Economic Analysis

16. Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining

17. Privacy Protection for Medical Data Sharing in Smart Healthcare

18. ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing

19. Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data

20. Ciphertext-Policy Attribute-Based Encryption with Multi-keyword Search over Medical Cloud Data

21. Handitext: handwriting recognition based on dynamic characteristics with incremental LSTM

22. THP: a novel authentication scheme to prevent multiple attacks in SDN-based IoT network

23. Privacy preserving cloud data sharing system with flexible control

24. Employing Hybrid sub-Nyquist Sampling Rates to Support Heterogeneous Services of Varying Capacity in 25-Gbps DDM-OFDM-PON

25. Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model

26. Identity-based conditional proxy re-encryption with fine grain policy

27. A proxy broadcast re-encryption for cloud data sharing

28. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

29. Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves

30. Novel Time Synchronization Scheme in Delay-Division-Multiplexing OFDM-PON Using Sub-Nyquist Sampling

32. A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme

33. Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption

34. A privacy preserve big data analysis system for wearable wireless sensor network

35. A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection with Electroluminescence Images

36. Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

37. APD-based delay-division-multiplexing OFDM-PONs

38. A Secure Multimedia Data Sharing Scheme for Wireless Network

39. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles: Table 1

40. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

41. Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage

42. On downstream transmissions in EPON Protocol over Coax (EPoC): An analysis of Coax framing approaches and other relevant considerations

43. Y-DWMS: A Digital Watermark Management System Based on Smart Contracts

44. Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing

45. EPON protocol over coax (EPoC): overview and design issues from a MAC layer perspective?

46. Public key encryption with keyword search secure against keyword guessing attacks without random oracle

47. A massage robot based on Chinese massage therapy

48. High speed OFDM-CDMA optical access network

49. 16-User OFDM-CDMA Optical Access Network

50. Hierarchical conditional proxy re-encryption

Catalog

Books, media, physical & digital resources