Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | << First < Previous 1 2 3 4 5 Next > Last >>
Select Subject
   All (8826)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
  WANG Hou-Zhen,ZHANG Huan-Guo, MAO Shao-Wu,WU Wan-Qing
  Computer Science and Technology 19 May 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. An Architecture-Centric Approach for Security Technical Debt Quantification
  Yang Jun,Rami Bahsoon,Liu Jiqiang
  Computer Science and Technology 30 March 2016
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. A privacy preserving method for community location sensing
  TAN Lei, FAN Hui-Ting, XING Kai
  Computer Science and Technology 07 December 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Signature Scheme from Trapdoor Functions
  HUANG Qiong
  Computer Science and Technology 21 November 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols
  HUANG Qiong
  Computer Science and Technology 21 November 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. A New Privacy-Preserving Smart Grid System
  Jiaping Lin,Xingwen Zhao
  Computer Science and Technology 31 August 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. The Attacks Against and Suggestions for the Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid
  Xiaole Mao,Xingwen Zhao
  Computer Science and Technology 25 August 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. Analysis and design of secure email system
  SAMASSI Alassane,XIN Yang
  Computer Science and Technology 15 June 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Universal Designated Verifier Transitive Signatures for Graph-based Big Data
  Shuquan Hou , Xinyi Huang ,Joseph K. Liu ,Jin Li ,Li Xu
  Computer Science and Technology 25 March 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. Cooperative Attribute-Based Access Control
  LI Mengting , HUANG Xinyi , LIU Joseph K. , XU Li , WU Wei
  Computer Science and Technology 16 January 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 77 Total, 8 Pages | << First < Previous 1 2 3 4 5 Next > Last >>