0 | -- | 0 | Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks |
0 | -- | 0 | Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan. uCloud: a user-centric key management scheme for cloud data protection |
0 | -- | 0 | Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang. Fair (t, n) threshold secret sharing scheme |
0 | -- | 0 | Salman Niksefat, Babak Sadeghiyan, Payman Mohassel. Oblivious decision program evaluation |
0 | -- | 0 | Khusvinder Gill, Shuang-Hua Yang, Wan-liang Wang. Secure remote access to home automation networks |
0 | -- | 0 | Xixiang Lv, Hui Li. Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks |
0 | -- | 0 | Lo'ai Ali Tawalbeh, Moad Mowafi, Walid Aljoby. Use of elliptic curve cryptography for multimedia encryption |
0 | -- | 0 | Fen Miao, Shu-Di Bao, Ye Li. Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security |
0 | -- | 0 | Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall. Antivirus performance characterisation: system-wide view |
0 | -- | 0 | Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu. m) using Hankel matrix and Karatsuba algorithm |
0 | -- | 0 | Yongzhuang Wei, Enes Pasalic. On the approximation of S-boxes via Maiorana-McFarland functions |
0 | -- | 0 | Debiao He, Baojun Huang, Jianhua Chen. New certificateless short signature scheme |