22 results on '"Chen, Liqun"'
Search Results
2. A Survey on Zero-Knowledge Authentication for Internet of Things.
3. On the feasibility of crawling-based attacks against recommender systems1.
4. DFE-IP: Delegatable functional encryption for inner product.
5. Fine-grained information flow control using attributes.
6. Bibliometrics of Machine Learning Research Using Homomorphic Encryption.
7. On the feasibility of crawling-based attacks against recommender systems1.
8. Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
9. GDPR – Challenges for Reconciling Legal Rules with Technical Reality
10. SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption
11. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
12. Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System
13. Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting
14. Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring
15. Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment
16. Standardization Transparency : An Out of Body Experience
17. Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software
18. Can Hand-Held Computers Still Be Better Smart Cards?
19. Trusted Virtual Domains – Design, Implementation and Lessons Learned
20. SocialClouds: Concept, Security Architecture and Some Mechanisms
21. Remote Attestation of Attribute Updates and Information Flows in a UCON System
22. Automated Device Pairing for Asymmetric Pairing Scenarios
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.