Search

Your search keyword '"Huang, Xinyi"' showing total 45 results

Search Constraints

Start Over You searched for: Author "Huang, Xinyi" Remove constraint Author: "Huang, Xinyi" Topic security Remove constraint Topic: security
45 results on '"Huang, Xinyi"'

Search Results

1. An Improved Lightweight RFID Authentication Protocol for Internet of Things

2. A Practical Authentication Protocol for Anonymous Web Browsing

3. OLBS: Oblivious Location-Based Services.

4. An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.

6. Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.

7. Data Access Control in Cloud Computing: Flexible and Receiver Extendable.

8. Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.

9. VILS: A Verifiable Image Licensing System.

10. Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.

11. Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.

12. Security and Privacy for the Internet of Drones: Challenges and Solutions.

13. Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.

14. An overview of Fog computing and its security issues.

15. Improved handover authentication and key pre-distribution for wireless mesh networks.

16. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.

17. Secure Outsourced Attribute-Based Signatures.

18. Provably Secure Group Key Management Approach Based upon Hyper-Sphere.

19. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.

20. A new privacy‐preserving authentication protocol for anonymous web browsing.

21. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.

22. Optimistic Fair Exchange with Strong Resolution-Ambiguity.

23. Secure Data Storage Scheme of Judicial System Based on Blockchain

24. A Secure and Privacy-Preserving Authentication Scheme in IoMT

25. A matrix-based cross-layer key establishment protocol for smart homes.

26. Concealed Communication in Online Social Networks

27. A Thieves Identification Scheme for Prepaid Systems in Smart Grids

28. Anchor: An NDN-Based Blockchain Network

29. A Privacy-Enhancing Framework for Internet of Things Services

32. Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT

33. An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing

34. Preserving User Location Privacy for Location-Based Service

35. A Methodology for Hook-Based Kernel Level Rootkits

36. On Secure and Power-Efficient RFID-Based Wireless Body Area Network

37. Towards a More Secure Apache Hadoop HDFS Infrastructure : Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures

38. Using Trusted Platform Modules for Location Assurance in Cloud Networking

39. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks

40. Using the Smart Card Web Server in Secure Branchless Banking

41. Leveraging String Kernels for Malware Detection

42. X-TIER: Kernel Module Injection

43. MADS: Malicious Android Applications Detection through String Analysis

44. Fine-grained information flow control using attributes.

45. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms

Catalog

Books, media, physical & digital resources