Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | << First < Previous 1 2 3 4 5 6 Next > Last >>
Select Subject
   All (8828)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. A New Efficient Request-Based Comparable Encryption Scheme
  CHEN Peng, YE Jun, CHEN Xiao-Feng
  Computer Science and Technology 30 December 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. A New Improved Algorithm for Secure Outsourcing of Modular Exponentiations
  Ye Jun, Chen Xiaofeng, Ma Jianfeng
  Computer Science and Technology 30 December 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Fully Simulatable Oblivious Transfer via Proof of Partial Knowledge
  Wei Xiao-Chao, Zhao Chuan, Jiang Han, Xu Qiu-Liang
  Computer Science and Technology 30 December 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Buyer-seller watermarking protocols suitable for probabilistic privacy homomorphisms
  ZENG Peng
  Computer Science and Technology 10 November 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. Security Enhancement to a User Authentication Scheme for Multi-Server Environment
  ZENG Peng
  Computer Science and Technology 29 October 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Applying Twin Support Vector Machines and Clustering to Intrusin Detection
  HE Jun,XU Guosheng
  Computer Science and Technology 08 May 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. A novel proxy signature scheme from factorization
  Yu yong
  Computer Science and Technology 15 January 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. Malware Process Detecting Via Hypervisor
  Shengdong Chen,Yang Zhang
  Computer Science and Technology 14 January 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
9. Two Quantum Direct Communication Protocols Based on Quantum Search Algorithm
  XU Shu-Jiang,CHEN Xiu-Bo,NIU Xin-Xin,YANG Yi-Xian
  Computer Science and Technology 25 December 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
10. A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS
  Wei Zhanhong, Chen Xiubo,Niu Xinxin,Yang Yixian
  Computer Science and Technology 24 December 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list

Rank
  Results per page: 77 Total, 8 Pages | << First < Previous 1 2 3 4 5 6 Next > Last >>