Home > Papers > Basic-Subject-of-Computer-science-and-technology

 
  There are 133 papers published in subject: > since this site started.
  Results per page: 133 Total, 14 Pages | << First < Previous 1 2 3 4 5 6 Next > Last >>
Select Subject
   All (8828)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. An Architecture-Centric Approach for Security Technical Debt Quantification
  Yang Jun,Rami Bahsoon,Liu Jiqiang
  Computer Science and Technology 30 March 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. A privacy preserving method for community location sensing
  TAN Lei, FAN Hui-Ting, XING Kai
  Computer Science and Technology 07 December 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Signature Scheme from Trapdoor Functions
  HUANG Qiong
  Computer Science and Technology 21 November 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols
  HUANG Qiong
  Computer Science and Technology 21 November 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. A New Privacy-Preserving Smart Grid System
  Jiaping Lin,Xingwen Zhao
  Computer Science and Technology 31 August 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. The Attacks Against and Suggestions for the Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid
  Xiaole Mao,Xingwen Zhao
  Computer Science and Technology 25 August 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. Analysis and design of secure email system
  SAMASSI Alassane,XIN Yang
  Computer Science and Technology 15 June 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. Parameterized Approximation Algorithms for the Shallow-Light Steiner Tree Problem
  GUO Longkun, LIAO Kewen, SHEN Hong
  Computer Science and Technology 02 June 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Approximating Algorithms for Computing Energy Constrained MinimumCost Steiner Trees
  ZOU Nianchen, GUO Longkun, HUANG Peihuang
  Computer Science and Technology 30 May 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Universal Designated Verifier Transitive Signatures for Graph-based Big Data
  Shuquan Hou , Xinyi Huang ,Joseph K. Liu ,Jin Li ,Li Xu
  Computer Science and Technology 25 March 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
  Results per page: 133 Total, 14 Pages | << First < Previous 1 2 3 4 5 6 Next > Last >>